Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-41218 (GCVE-0-2022-41218)
Vulnerability from cvelistv5 – Published: 2022-09-21 00:00 – Updated: 2025-05-28 15:28- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T12:35:49.594Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c"
},
{
"name": "[oss-security] 20220923 CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/23/4"
},
{
"name": "[oss-security] 20220923 Re: [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/24/2"
},
{
"name": "[oss-security] 20220923 [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/24/1"
},
{
"name": "DSA-5324",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5324"
},
{
"name": "[debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"
},
{
"name": "[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-41218",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-28T15:28:21.548855Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-28T15:28:47.976Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-25T00:41:17.864Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c"
},
{
"name": "[oss-security] 20220923 CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/23/4"
},
{
"name": "[oss-security] 20220923 Re: [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/24/2"
},
{
"name": "[oss-security] 20220923 [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/24/1"
},
{
"name": "DSA-5324",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5324"
},
{
"name": "[debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"
},
{
"name": "[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
},
{
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-41218",
"datePublished": "2022-09-21T00:00:00.000Z",
"dateReserved": "2022-09-21T00:00:00.000Z",
"dateUpdated": "2025-05-28T15:28:47.976Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.19.10\", \"matchCriteriaId\": \"CA5E92AD-18DF-4742-9123-05968CA8B3D7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.\"}, {\"lang\": \"es\", \"value\": \"En el archivo drivers/media/dvb-core/dmxdev.c en el kernel de Linux versiones hasta 5.19.10, se presenta un uso de memoria previamente liberada causado por refcount races, que afecta a dvb_demux_open y dvb_dmxdev_release\"}]",
"id": "CVE-2022-41218",
"lastModified": "2024-11-21T07:22:51.280",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2022-09-21T07:15:08.643",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/23/4\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5324\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/23/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5324\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-41218\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-09-21T07:15:08.643\",\"lastModified\":\"2025-05-28T16:15:28.290\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.\"},{\"lang\":\"es\",\"value\":\"En el archivo drivers/media/dvb-core/dmxdev.c en el kernel de Linux versiones hasta 5.19.10, se presenta un uso de memoria previamente liberada causado por refcount races, que afecta a dvb_demux_open y dvb_dmxdev_release\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.19.10\",\"matchCriteriaId\":\"CA5E92AD-18DF-4742-9123-05968CA8B3D7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/23/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/24/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/24/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5324\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/23/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/24/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/24/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5324\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/23/4\", \"name\": \"[oss-security] 20220923 CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/2\", \"name\": \"[oss-security] 20220923 Re: [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/1\", \"name\": \"[oss-security] 20220923 [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5324\", \"name\": \"DSA-5324\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html\", \"name\": \"[debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html\", \"name\": \"[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T12:35:49.594Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-41218\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-28T15:28:21.548855Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-28T15:28:44.497Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/\"}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/23/4\", \"name\": \"[oss-security] 20220923 CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/2\", \"name\": \"[oss-security] 20220923 Re: [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/24/1\", \"name\": \"[oss-security] 20220923 [Report v2] CVE-2022-41218: Linux dvb-core: UAF in dvb-core/dmxdev\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5324\", \"name\": \"DSA-5324\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html\", \"name\": \"[debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html\", \"name\": \"[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-03-25T00:41:17.864Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-41218\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-28T15:28:47.976Z\", \"dateReserved\": \"2022-09-21T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2022-09-21T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2022:4528-1
Vulnerability from csaf_suse - Published: 2022-12-17 17:34 - Updated: 2022-12-17 17:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_60 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4528,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4528,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4532",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4528-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4528-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224528-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4528-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T17:34:13Z",
"generator": {
"date": "2022-12-17T17:34:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4528-1",
"initial_release_date": "2022-12-17T17:34:13Z",
"revision_history": [
{
"date": "2022-12-17T17:34:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_49-preempt-16-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_49-preempt-16-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_49-preempt-16-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-16-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-14-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T17:34:13Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4527-1
Vulnerability from csaf_suse - Published: 2022-12-17 12:05 - Updated: 2022-12-17 12:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150100_197_111 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4527,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4527",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4527-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4527-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224527-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4527-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-17T12:05:41Z",
"generator": {
"date": "2022-12-17T12:05:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4527-1",
"initial_release_date": "2022-12-17T12:05:41Z",
"revision_history": [
{
"date": "2022-12-17T12:05:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-10-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T12:05:41Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4518-1
Vulnerability from csaf_suse - Published: 2022-12-16 22:34 - Updated: 2022-12-16 22:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_24_18 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4518,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4518,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4519",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4518-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4518-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224518-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4518-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-16T22:34:11Z",
"generator": {
"date": "2022-12-16T22:34:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4518-1",
"initial_release_date": "2022-12-16T22:34:11Z",
"revision_history": [
{
"date": "2022-12-16T22:34:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-6-150400.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_18-default-6-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T22:34:11Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3779-1
Vulnerability from csaf_suse - Published: 2022-10-26 13:03 - Updated: 2022-10-26 13:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12-SP2 kernel was updated receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).\n\nThe following non-security bugs were fixed:\n\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3779,SUSE-SLE-SERVER-12-SP2-BCL-2022-3779",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3779-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3779-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223779-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3779-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-26T13:03:14Z",
"generator": {
"date": "2022-10-26T13:03:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3779-1",
"initial_release_date": "2022-10-26T13:03:14Z",
"revision_history": [
{
"date": "2022-10-26T13:03:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.191.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.191.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.191.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.191.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.191.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.191.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.191.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.191.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.191.1.aarch64",
"product_id": "kernel-default-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.191.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.191.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.191.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.191.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.191.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.191.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.191.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.191.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.191.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.191.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.191.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.191.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.191.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.191.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.191.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.191.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.191.1.noarch",
"product_id": "kernel-devel-4.4.121-92.191.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.191.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.191.1.noarch",
"product_id": "kernel-docs-4.4.121-92.191.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.191.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.191.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.191.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.191.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.191.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.191.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.191.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.191.1.noarch",
"product_id": "kernel-macros-4.4.121-92.191.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.191.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.191.1.noarch",
"product_id": "kernel-source-4.4.121-92.191.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.191.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.191.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.191.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.191.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.191.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.191.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.191.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.191.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.191.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.191.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.191.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.191.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.191.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.191.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.191.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.191.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.191.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.191.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.191.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.191.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.191.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.191.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.191.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.191.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.191.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.191.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.191.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.191.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.191.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.191.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.191.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.191.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.191.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.191.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.191.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.191.1.s390x",
"product_id": "kernel-default-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.191.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.191.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.191.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.191.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.191.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.191.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.191.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.191.1.s390x",
"product_id": "kernel-syms-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.191.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.191.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.191.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.191.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.191.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.191.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.191.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.191.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.191.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.191.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.191.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.191.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.191.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.191.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.191.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.191.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.191.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.191.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.191.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.191.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.191.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.191.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.191.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.191.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.191.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.191.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.191.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.191.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.191.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.191.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.191.1.x86_64",
"product_id": "kernel-default-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.191.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.191.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.191.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.191.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.191.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.191.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.191.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.191.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.191.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.191.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.191.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.191.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.191.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.191.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.191.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.191.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.191.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.191.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.191.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.191.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.191.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.191.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.191.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T13:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T13:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T13:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T13:03:14Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
}
]
}
SUSE-SU-2022:3609-1
Vulnerability from csaf_suse - Published: 2022-10-18 09:44 - Updated: 2022-10-18 09:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bnc#1196616).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).\n- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).\n- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: fix spelling mistakes (git-fixes).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).\n- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).\n- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).\n- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)\n- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes)\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)\n- arm64: mm: fix p?d_leaf() (git-fixes)\n- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)\n- arm64: mm: Validate hotplug range before creating linear mapping (git-fixes)\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)\n- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)\n- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).\n- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).\n- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).\n- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).\n- blktrace: fix blk_rq_merge documentation (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: m_can: process interrupt only when not runtime suspended (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).\n- ceph: do not truncate file in atomic_open (bsc#1202811).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- cgroup: Trace event cgroup id fields should be u64 (git-fixes).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).\n- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- ehea: fix error return code in ehea_restart_qps() (git-fixes).\n- enetc: Fix endianness issues for enetc_qos (git-fixes).\n- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: ioctl: translate ENOSYS (bsc#1203136).\n- fuse: limit nsec (bsc#1203135).\n- fuse: Remove the control interface for virtio-fs (bsc#1203137).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: ssif: initialize ssif_info-\u003eclient early (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (git-fixes).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- jfs: fix GPF in diFree (bsc#1203389).\n- JFS: fix memleak in jfs_mount (git-fixes).\n- JFS: more checks for invalid superblock (git-fixes).\n- jfs: prevent NULL deref in diFree (bsc#1203389).\n- kABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).\n- kabi/severities: add stmmac driver local sumbols\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).\n- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).\n- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- list: add \u0027list_del_init_careful()\u0027 to go with \u0027list_empty_careful()\u0027 (bsc#1202745).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: rc: increase rc-mm tolerance and add debug message (git-fixes).\n- media: rtl28xxu: add missing sleep before probing slave demod (git-fixes).\n- media: rtl28xxu: Add support for PROlectrix DV107669 DVB-T dongle (git-fixes).\n- media: rtl28xxu: set keymap for Astrometa DVB-T2 (git-fixes).\n- media: smipcie: fix interrupt handling and IR timeout (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: usb: dvb-usb-v2: rtl28xxu: convert to use i2c_new_client_device() (git-fixes).\n- media: v4l2-mem2mem: always consider OUTPUT queue during poll (git-fixes).\n- media: v4l2-mem2mem: reorder checks in v4l2_m2m_poll() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: fix page reference leak in soft_offline_page() (git fixes (mm/memory-failure)).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).\n- mm: rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).\n- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: cpsw: Properly initialise struct page_pool_params (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: dsa: b53: fix an off by one in checking \u0027vlan-\u003evid\u0027 (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).\n- net: ethernet: ezchip: fix error handling (git-fixes).\n- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).\n- net: ethernet: ezchip: remove redundant check (git-fixes).\n- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).\n- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).\n- net: fec_ptp: add clock rate zero check (git-fixes).\n- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).\n- net: ftgmac100: Fix crash when removing driver (git-fixes).\n- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).\n- net: hns: Fix kernel-doc (git-fixes).\n- net: lantiq: fix memory corruption in RX ring (git-fixes).\n- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).\n- net: netcp: Fix an error message (git-fixes).\n- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).\n- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).\n- net: stmmac: Modify configuration method of EEE timers (git-fixes).\n- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).\n- net/sonic: Fix a resource leak in an error handling path in \u0027jazz_sonic_probe()\u0027 (git-fixes).\n- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFS: Fix races in the legacy idmapper upcall (git-fixes).\n- NFS: Fix second deadlock in nfs4_evict_inode() (git-fixes).\n- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFS: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: fix use-after-free due to delegation race (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- ocfs2: drop acl cache for directories too (bsc#1191667).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if \u0027snps,enable-cdm-check\u0027 exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: qcom: Fix pipe clock imbalance (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- pinctrl/rockchip: fix gpio device creation (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- PM: runtime: Remove link state checks in rpm_get/put_supplier() (git-fixes).\n- powerpc: define get_cycles macro for arch-override (bsc#1065729).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- profiling: fix shift-out-of-bounds bugs (git fixes).\n- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).\n- random: remove useless header comment (git fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: fix 2KB pgtable release race (git-fixes).\n- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).\n- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).\n- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).\n- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).\n- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).\n- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).\n- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).\n- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- sched/fair: Revise comment about lb decision matrix (git fixes (sched/fair)).\n- sched/membarrier: fix missing local execution of ipi_sync_rq_state() (git fixes (sched/membarrier)).\n- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: smartpqi: Update LUN reset handler (bsc#1200622).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- squashfs: fix divide error in calculate_skip() (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- SUNRPC reverting d03727b248d0 (\u0027NFSv4 fix CLOSE not waiting for direct IO compeletion\u0027) (git-fixes).\n- SUNRPC: Clean up scheduling of autoclose (git-fixes).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not dereference xprt-\u003esnd_task if it\u0027s a cookie (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: fix expiry of auth creds (git-fixes).\n- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).\n- tee: optee: Fix incorrect page free bug (git-fixes).\n- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation (git fixes (kernel/time)).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- USB: dwc3: add cancelled reasons for dwc3 requests (git-fixes).\n- USB: dwc3: disable USB core PHY management (git-fixes).\n- USB: dwc3: ep0: Fix delay status handling (git-fixes).\n- USB: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).\n- USB: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- USB: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).\n- USB: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).\n- USB: dwc3: gadget: Remove unnecessary checks (git-fixes).\n- USB: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- USB: dwc3: gadget: Store resource index of start cmd (git-fixes).\n- USB: dwc3: qcom: fix missing optional irq warnings.\n- USB: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).\n- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- USB: gadget: u_audio: fix race condition on endpoint stop (git-fixes).\n- USB: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- USB: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- USB: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- USB: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- USB: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- USB: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- USB: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).\n- USB: renesas: Fix refcount leak bug (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: ch341: name prescaler, divisor registers (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- USB: storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- USB: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- USB: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).\n- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).\n- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).\n- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).\n- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).\n- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xprtrdma: Fix cwnd update ordering (git-fixes).\n- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3609,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3609,openSUSE-SLE-15.3-2022-3609",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3609-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3609-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223609-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3609-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html"
},
{
"category": "self",
"summary": "SUSE Bug 1023051",
"url": "https://bugzilla.suse.com/1023051"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1177471",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "self",
"summary": "SUSE Bug 1179722",
"url": "https://bugzilla.suse.com/1179722"
},
{
"category": "self",
"summary": "SUSE Bug 1179723",
"url": "https://bugzilla.suse.com/1179723"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1191662",
"url": "https://bugzilla.suse.com/1191662"
},
{
"category": "self",
"summary": "SUSE Bug 1191667",
"url": "https://bugzilla.suse.com/1191667"
},
{
"category": "self",
"summary": "SUSE Bug 1191881",
"url": "https://bugzilla.suse.com/1191881"
},
{
"category": "self",
"summary": "SUSE Bug 1192594",
"url": "https://bugzilla.suse.com/1192594"
},
{
"category": "self",
"summary": "SUSE Bug 1194023",
"url": "https://bugzilla.suse.com/1194023"
},
{
"category": "self",
"summary": "SUSE Bug 1194272",
"url": "https://bugzilla.suse.com/1194272"
},
{
"category": "self",
"summary": "SUSE Bug 1194535",
"url": "https://bugzilla.suse.com/1194535"
},
{
"category": "self",
"summary": "SUSE Bug 1196444",
"url": "https://bugzilla.suse.com/1196444"
},
{
"category": "self",
"summary": "SUSE Bug 1196616",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "self",
"summary": "SUSE Bug 1196867",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "self",
"summary": "SUSE Bug 1197158",
"url": "https://bugzilla.suse.com/1197158"
},
{
"category": "self",
"summary": "SUSE Bug 1197659",
"url": "https://bugzilla.suse.com/1197659"
},
{
"category": "self",
"summary": "SUSE Bug 1197755",
"url": "https://bugzilla.suse.com/1197755"
},
{
"category": "self",
"summary": "SUSE Bug 1197756",
"url": "https://bugzilla.suse.com/1197756"
},
{
"category": "self",
"summary": "SUSE Bug 1197757",
"url": "https://bugzilla.suse.com/1197757"
},
{
"category": "self",
"summary": "SUSE Bug 1197760",
"url": "https://bugzilla.suse.com/1197760"
},
{
"category": "self",
"summary": "SUSE Bug 1197763",
"url": "https://bugzilla.suse.com/1197763"
},
{
"category": "self",
"summary": "SUSE Bug 1197920",
"url": "https://bugzilla.suse.com/1197920"
},
{
"category": "self",
"summary": "SUSE Bug 1198971",
"url": "https://bugzilla.suse.com/1198971"
},
{
"category": "self",
"summary": "SUSE Bug 1199255",
"url": "https://bugzilla.suse.com/1199255"
},
{
"category": "self",
"summary": "SUSE Bug 1199291",
"url": "https://bugzilla.suse.com/1199291"
},
{
"category": "self",
"summary": "SUSE Bug 1200084",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "self",
"summary": "SUSE Bug 1200313",
"url": "https://bugzilla.suse.com/1200313"
},
{
"category": "self",
"summary": "SUSE Bug 1200431",
"url": "https://bugzilla.suse.com/1200431"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1200868",
"url": "https://bugzilla.suse.com/1200868"
},
{
"category": "self",
"summary": "SUSE Bug 1200869",
"url": "https://bugzilla.suse.com/1200869"
},
{
"category": "self",
"summary": "SUSE Bug 1200870",
"url": "https://bugzilla.suse.com/1200870"
},
{
"category": "self",
"summary": "SUSE Bug 1200871",
"url": "https://bugzilla.suse.com/1200871"
},
{
"category": "self",
"summary": "SUSE Bug 1200872",
"url": "https://bugzilla.suse.com/1200872"
},
{
"category": "self",
"summary": "SUSE Bug 1200873",
"url": "https://bugzilla.suse.com/1200873"
},
{
"category": "self",
"summary": "SUSE Bug 1201019",
"url": "https://bugzilla.suse.com/1201019"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1201420",
"url": "https://bugzilla.suse.com/1201420"
},
{
"category": "self",
"summary": "SUSE Bug 1201442",
"url": "https://bugzilla.suse.com/1201442"
},
{
"category": "self",
"summary": "SUSE Bug 1201489",
"url": "https://bugzilla.suse.com/1201489"
},
{
"category": "self",
"summary": "SUSE Bug 1201610",
"url": "https://bugzilla.suse.com/1201610"
},
{
"category": "self",
"summary": "SUSE Bug 1201645",
"url": "https://bugzilla.suse.com/1201645"
},
{
"category": "self",
"summary": "SUSE Bug 1201705",
"url": "https://bugzilla.suse.com/1201705"
},
{
"category": "self",
"summary": "SUSE Bug 1201726",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "self",
"summary": "SUSE Bug 1201865",
"url": "https://bugzilla.suse.com/1201865"
},
{
"category": "self",
"summary": "SUSE Bug 1201948",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "self",
"summary": "SUSE Bug 1201990",
"url": "https://bugzilla.suse.com/1201990"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202096",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202154",
"url": "https://bugzilla.suse.com/1202154"
},
{
"category": "self",
"summary": "SUSE Bug 1202341",
"url": "https://bugzilla.suse.com/1202341"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1202347",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202393",
"url": "https://bugzilla.suse.com/1202393"
},
{
"category": "self",
"summary": "SUSE Bug 1202396",
"url": "https://bugzilla.suse.com/1202396"
},
{
"category": "self",
"summary": "SUSE Bug 1202447",
"url": "https://bugzilla.suse.com/1202447"
},
{
"category": "self",
"summary": "SUSE Bug 1202577",
"url": "https://bugzilla.suse.com/1202577"
},
{
"category": "self",
"summary": "SUSE Bug 1202636",
"url": "https://bugzilla.suse.com/1202636"
},
{
"category": "self",
"summary": "SUSE Bug 1202672",
"url": "https://bugzilla.suse.com/1202672"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202701",
"url": "https://bugzilla.suse.com/1202701"
},
{
"category": "self",
"summary": "SUSE Bug 1202708",
"url": "https://bugzilla.suse.com/1202708"
},
{
"category": "self",
"summary": "SUSE Bug 1202709",
"url": "https://bugzilla.suse.com/1202709"
},
{
"category": "self",
"summary": "SUSE Bug 1202710",
"url": "https://bugzilla.suse.com/1202710"
},
{
"category": "self",
"summary": "SUSE Bug 1202711",
"url": "https://bugzilla.suse.com/1202711"
},
{
"category": "self",
"summary": "SUSE Bug 1202712",
"url": "https://bugzilla.suse.com/1202712"
},
{
"category": "self",
"summary": "SUSE Bug 1202713",
"url": "https://bugzilla.suse.com/1202713"
},
{
"category": "self",
"summary": "SUSE Bug 1202714",
"url": "https://bugzilla.suse.com/1202714"
},
{
"category": "self",
"summary": "SUSE Bug 1202715",
"url": "https://bugzilla.suse.com/1202715"
},
{
"category": "self",
"summary": "SUSE Bug 1202716",
"url": "https://bugzilla.suse.com/1202716"
},
{
"category": "self",
"summary": "SUSE Bug 1202717",
"url": "https://bugzilla.suse.com/1202717"
},
{
"category": "self",
"summary": "SUSE Bug 1202718",
"url": "https://bugzilla.suse.com/1202718"
},
{
"category": "self",
"summary": "SUSE Bug 1202720",
"url": "https://bugzilla.suse.com/1202720"
},
{
"category": "self",
"summary": "SUSE Bug 1202722",
"url": "https://bugzilla.suse.com/1202722"
},
{
"category": "self",
"summary": "SUSE Bug 1202745",
"url": "https://bugzilla.suse.com/1202745"
},
{
"category": "self",
"summary": "SUSE Bug 1202756",
"url": "https://bugzilla.suse.com/1202756"
},
{
"category": "self",
"summary": "SUSE Bug 1202810",
"url": "https://bugzilla.suse.com/1202810"
},
{
"category": "self",
"summary": "SUSE Bug 1202811",
"url": "https://bugzilla.suse.com/1202811"
},
{
"category": "self",
"summary": "SUSE Bug 1202860",
"url": "https://bugzilla.suse.com/1202860"
},
{
"category": "self",
"summary": "SUSE Bug 1202895",
"url": "https://bugzilla.suse.com/1202895"
},
{
"category": "self",
"summary": "SUSE Bug 1202898",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1202984",
"url": "https://bugzilla.suse.com/1202984"
},
{
"category": "self",
"summary": "SUSE Bug 1203063",
"url": "https://bugzilla.suse.com/1203063"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203116",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "self",
"summary": "SUSE Bug 1203117",
"url": "https://bugzilla.suse.com/1203117"
},
{
"category": "self",
"summary": "SUSE Bug 1203135",
"url": "https://bugzilla.suse.com/1203135"
},
{
"category": "self",
"summary": "SUSE Bug 1203136",
"url": "https://bugzilla.suse.com/1203136"
},
{
"category": "self",
"summary": "SUSE Bug 1203137",
"url": "https://bugzilla.suse.com/1203137"
},
{
"category": "self",
"summary": "SUSE Bug 1203159",
"url": "https://bugzilla.suse.com/1203159"
},
{
"category": "self",
"summary": "SUSE Bug 1203313",
"url": "https://bugzilla.suse.com/1203313"
},
{
"category": "self",
"summary": "SUSE Bug 1203389",
"url": "https://bugzilla.suse.com/1203389"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203424",
"url": "https://bugzilla.suse.com/1203424"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203622",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "self",
"summary": "SUSE Bug 1203737",
"url": "https://bugzilla.suse.com/1203737"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203906",
"url": "https://bugzilla.suse.com/1203906"
},
{
"category": "self",
"summary": "SUSE Bug 1203909",
"url": "https://bugzilla.suse.com/1203909"
},
{
"category": "self",
"summary": "SUSE Bug 1203933",
"url": "https://bugzilla.suse.com/1203933"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203939",
"url": "https://bugzilla.suse.com/1203939"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16119 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27784 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36516 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20369 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26373 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2639 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2905 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2977 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3028 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39190 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41222 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-18T09:44:53Z",
"generator": {
"date": "2022-10-18T09:44:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3609-1",
"initial_release_date": "2022-10-18T09:44:53Z",
"revision_history": [
{
"date": "2022-10-18T09:44:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"product_id": "kernel-source-azure-5.3.18-150300.38.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "kernel-azure-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2020-16119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16119"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16119",
"url": "https://www.suse.com/security/cve/CVE-2020-16119"
},
{
"category": "external",
"summary": "SUSE Bug 1177471 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "external",
"summary": "SUSE Bug 1177742 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "important"
}
],
"title": "CVE-2020-16119"
},
{
"cve": "CVE-2020-27784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27784"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27784",
"url": "https://www.suse.com/security/cve/CVE-2020-27784"
},
{
"category": "external",
"summary": "SUSE Bug 1202895 for CVE-2020-27784",
"url": "https://bugzilla.suse.com/1202895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-27784"
},
{
"cve": "CVE-2020-36516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36516"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36516",
"url": "https://www.suse.com/security/cve/CVE-2020-36516"
},
{
"category": "external",
"summary": "SUSE Bug 1196616 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "external",
"summary": "SUSE Bug 1196867 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "external",
"summary": "SUSE Bug 1204092 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204092"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "important"
}
],
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2021-4155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4155"
}
],
"notes": [
{
"category": "general",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4155",
"url": "https://www.suse.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "SUSE Bug 1194272 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1194272"
},
{
"category": "external",
"summary": "SUSE Bug 1199255 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1199255"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-4203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4203"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4203",
"url": "https://www.suse.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "SUSE Bug 1194535 for CVE-2021-4203",
"url": "https://bugzilla.suse.com/1194535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20369"
}
],
"notes": [
{
"category": "general",
"text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20369",
"url": "https://www.suse.com/security/cve/CVE-2022-20369"
},
{
"category": "external",
"summary": "SUSE Bug 1202347 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "external",
"summary": "SUSE Bug 1212321 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1212321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-26373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26373"
}
],
"notes": [
{
"category": "general",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26373",
"url": "https://www.suse.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "SUSE Bug 1201726 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "external",
"summary": "SUSE Bug 1209619 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1209619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2639"
}
],
"notes": [
{
"category": "general",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2639",
"url": "https://www.suse.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "SUSE Bug 1202154 for CVE-2022-2639",
"url": "https://bugzilla.suse.com/1202154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2905"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2905",
"url": "https://www.suse.com/security/cve/CVE-2022-2905"
},
{
"category": "external",
"summary": "SUSE Bug 1202860 for CVE-2022-2905",
"url": "https://bugzilla.suse.com/1202860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2977"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2977",
"url": "https://www.suse.com/security/cve/CVE-2022-2977"
},
{
"category": "external",
"summary": "SUSE Bug 1202672 for CVE-2022-2977",
"url": "https://bugzilla.suse.com/1202672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-3028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3028"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3028",
"url": "https://www.suse.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "SUSE Bug 1202898 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "external",
"summary": "SUSE Bug 1212296 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1212296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-36879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36879"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36879",
"url": "https://www.suse.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "SUSE Bug 1201948 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "external",
"summary": "SUSE Bug 1212327 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1212327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "important"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39190"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39190",
"url": "https://www.suse.com/security/cve/CVE-2022-39190"
},
{
"category": "external",
"summary": "SUSE Bug 1203117 for CVE-2022-39190",
"url": "https://bugzilla.suse.com/1203117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41222"
}
],
"notes": [
{
"category": "general",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41222",
"url": "https://www.suse.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "SUSE Bug 1203622 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "external",
"summary": "SUSE Bug 1203624 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1209476 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "important"
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-18T09:44:53Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
}
]
}
SUSE-SU-2022:3599-1
Vulnerability from csaf_suse - Published: 2022-10-17 11:21 - Updated: 2022-10-17 11:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).\n\nThe following non-security bugs were fixed:\n\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3599,SUSE-SLE-SERVER-12-SP3-BCL-2022-3599",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3599-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3599-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223599-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3599-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-17T11:21:21Z",
"generator": {
"date": "2022-10-17T11:21:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3599-1",
"initial_release_date": "2022-10-17T11:21:21Z",
"revision_history": [
{
"date": "2022-10-17T11:21:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.177.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.177.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.177.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.177.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.177.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.177.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.177.1.aarch64",
"product_id": "kernel-default-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.177.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.177.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.177.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.177.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.177.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.177.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.177.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.177.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.177.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.177.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.177.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.177.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.177.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.177.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.177.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.177.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.177.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.177.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.177.1.noarch",
"product_id": "kernel-devel-4.4.180-94.177.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.177.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.177.1.noarch",
"product_id": "kernel-docs-4.4.180-94.177.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.177.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.177.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.177.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.177.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.177.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.177.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.177.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.177.1.noarch",
"product_id": "kernel-macros-4.4.180-94.177.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.177.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.177.1.noarch",
"product_id": "kernel-source-4.4.180-94.177.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.177.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.177.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.177.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.177.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.177.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.177.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.177.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.177.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.177.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.177.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.177.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.177.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.177.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.177.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.177.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.177.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.177.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.177.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.177.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.177.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.177.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.177.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.177.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.177.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.177.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.177.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.177.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.177.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.177.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.177.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.177.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.177.1.s390x",
"product_id": "kernel-default-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.177.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.177.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.177.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.177.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.177.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.177.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.177.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.177.1.s390x",
"product_id": "kernel-syms-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.177.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.177.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.177.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.177.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.177.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.177.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.177.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.177.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.177.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.177.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.177.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.177.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.177.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.177.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.177.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.177.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.177.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.177.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.177.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.177.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.177.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.177.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.177.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.177.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.177.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.177.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.177.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.177.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.177.1.x86_64",
"product_id": "kernel-default-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.177.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.177.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.177.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.177.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.177.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.177.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.177.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.177.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.177.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.177.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.177.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.177.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.177.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.177.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.177.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.177.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.177.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.177.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.177.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.177.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.177.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.177.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.177.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.177.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.177.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.177.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.177.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.177.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.177.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.177.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.177.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.177.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.177.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.177.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.177.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-17T11:21:21Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-17T11:21:21Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-17T11:21:21Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.177.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.177.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.177.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-17T11:21:21Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
}
]
}
SUSE-SU-2022:4545-1
Vulnerability from csaf_suse - Published: 2022-12-18 00:05 - Updated: 2022-12-18 00:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-122_133 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4545,SUSE-SLE-Live-Patching-12-SP5-2022-4545",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4545-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4545-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224545-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4545-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5)",
"tracking": {
"current_release_date": "2022-12-18T00:05:33Z",
"generator": {
"date": "2022-12-18T00:05:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4545-1",
"initial_release_date": "2022-12-18T00:05:33Z",
"revision_history": [
{
"date": "2022-12-18T00:05:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_133-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-18T00:05:33Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3587-1
Vulnerability from csaf_suse - Published: 2022-10-14 07:56 - Updated: 2022-10-14 07:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).\n- CVE-2022-20008: Fixed a bug which allowed to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. (bnc#1199564)\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bnc#1202097).\n- CVE-2022-39188: Fixed a race condition where a device driver can free a page while it still has stale TLB entries. (bnc#1203107).\n\nThe following non-security bugs were fixed:\n\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- cifs: alloc_mid function should be marked as static (bsc#1190317).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1190317).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1190317).\n- cifs: check for smb1 in open_cached_dir() (bsc#1190317).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1190317).\n- cifs: clean up an inconsistent indenting (bsc#1190317).\n- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1190317).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1190317).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1190317).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1190317).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1190317).\n- cifs: fix handlecache and multiuser (bsc#1190317).\n- cifs: fix lock length calculation (bsc#1190317).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1190317).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1190317).\n- cifs: fix NULL ptr dereference in smb2_ioctl_query_info() (bsc#1190317).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1190317).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1190317).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1190317).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1190317).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1190317).\n- cifs: mark sessions for reconnection in helper function (bsc#1190317).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1190317).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1190317).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1190317).\n- cifs: move superblock magic defitions to magic.h (bsc#1190317).\n- cifs: potential buffer overflow in handling symlinks (bsc#1190317).\n- cifs: prevent bad output lengths in smb2_ioctl_query_info() (bsc#1190317).\n- cifs: release cached dentries only if mount is complete (bsc#1190317).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1190317).\n- cifs: remove check of list iterator against head past the loop body (bsc#1190317).\n- cifs: remove minor build warning (bsc#1190317).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1190317).\n- cifs: remove remaining build warnings (bsc#1190317).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1190317).\n- cifs: remove some camelCase and also some static build warnings (bsc#1190317).\n- cifs: remove unnecessary (void*) conversions (bsc#1190317).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1190317).\n- cifs: remove useless DeleteMidQEntry() (bsc#1190317).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1190317).\n- cifs: return errors during session setup during reconnects (bsc#1190317).\n- cifs: return the more nuanced writeback error on close() (bsc#1190317).\n- cifs: sanitize multiple delimiters in prepath (bsc#1190317).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1190317).\n- cifs: skip trailing separators of prefix paths (bsc#1190317).\n- cifs: smbd: fix typo in comment (bsc#1190317).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1190317).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1190317).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1190317).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1190317).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1190317).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1190317).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1190317).\n- dm: thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1203462).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (bsc#1154048)\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- Input: iforce - constify usb_device_id and fix space before \u0027[\u0027 error (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: stop telling users to snail-mail Vojtech (git-fixes).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).\n- powerpc: Use device_type helpers to access the node type (bsc#1203424 ltc#199544).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- scsi: ch: Make it possible to open a ch device multiple times again (git-fixes).\n- scsi: core: Avoid that a kernel warning appears during system resume (git-fixes).\n- scsi: core: Avoid that system resume triggers a kernel warning (git-fixes).\n- scsi: fcoe: Embed fc_rport_priv in fcoe_rport structure (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (git-fixes).\n- scsi: lpfc: Check the return value of alloc_workqueue() (git-fixes).\n- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (git-fixes).\n- scsi: mpt3sas: Fix ioctl timeout (git-fixes).\n- scsi: mpt3sas: Fix sync irqs (git-fixes).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (git-fixes).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sd_zbc: Fix compilation warning (git-fixes).\n- scsi: sd: enable compat ioctls for sed-opal (git-fixes).\n- scsi: sd: Fix Opal support (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- SMB2: small refactor in smb2_check_message() (bsc#1190317).\n- SMB3: add trace point for SMB2_set_eof (bsc#1190317).\n- SMB3: check for null tcon (bsc#1190317).\n- SMB3: check xattr value length earlier (bsc#1190317).\n- SMB3: do not set rc when used and unneeded in query_info_compound (bsc#1190317).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1190317).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- sysfb: Enable boot time VESA graphic mode selection (bsc#1129770) Backporting notes: \t* context changes \t* config update\n- USB: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- USB: serial: ftdi_sio: add Belimo device ids (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support.\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- USB: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (bsc#1154048) Backporting notes: \t* context changes\n- video: fbdev: arkfb: Check the size of screen before memset_io() (bsc#1154048)\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (bsc#1154048)\n- video: fbdev: s3fb: Check the size of screen before memset_io() (bsc#1154048)\n- video: fbdev: sis: fix typos in SiS_GetModeID() (bsc#1154048)\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (bsc#1154048)\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n- xhci: bail out early if driver can\u0027t accress host in resume (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3587,SUSE-SLE-HA-12-SP5-2022-3587,SUSE-SLE-Live-Patching-12-SP5-2022-3587,SUSE-SLE-SDK-12-SP5-2022-3587,SUSE-SLE-SERVER-12-SP5-2022-3587,SUSE-SLE-WE-12-SP5-2022-3587",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3587-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3587-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223587-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3587-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html"
},
{
"category": "self",
"summary": "SUSE Bug 1124235",
"url": "https://bugzilla.suse.com/1124235"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1154048",
"url": "https://bugzilla.suse.com/1154048"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1199564",
"url": "https://bugzilla.suse.com/1199564"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203424",
"url": "https://bugzilla.suse.com/1203424"
},
{
"category": "self",
"summary": "SUSE Bug 1203462",
"url": "https://bugzilla.suse.com/1203462"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20008 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-14T07:56:09Z",
"generator": {
"date": "2022-10-14T07:56:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3587-1",
"initial_release_date": "2022-10-14T07:56:09Z",
"revision_history": [
{
"date": "2022-10-14T07:56:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.136.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.136.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.136.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.136.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.136.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.136.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.136.1.aarch64",
"product_id": "kernel-default-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.136.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.136.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.136.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.136.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.136.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.136.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.136.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.136.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.136.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.136.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.136.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.136.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.136.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.136.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.136.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.136.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.136.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.136.1.noarch",
"product_id": "kernel-devel-4.12.14-122.136.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.136.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.136.1.noarch",
"product_id": "kernel-docs-4.12.14-122.136.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.136.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.136.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.136.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.136.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.136.1.noarch",
"product_id": "kernel-macros-4.12.14-122.136.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.136.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.136.1.noarch",
"product_id": "kernel-source-4.12.14-122.136.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.136.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.136.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.136.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.136.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.136.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.136.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.136.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.136.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.136.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.136.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.136.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.136.1.s390x",
"product_id": "kernel-default-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.136.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.136.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.136.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.136.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.136.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.136.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.136.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.136.1.s390x",
"product_id": "kernel-syms-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.136.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.136.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.136.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.136.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.136.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.136.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.136.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.136.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.136.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.136.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.136.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.136.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.136.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.136.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.136.1.x86_64",
"product_id": "kernel-default-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.136.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.136.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.136.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.136.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.136.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.136.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.136.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.136.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.136.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.136.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.136.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.136.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.136.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.136.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.136.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.136.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.136.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.136.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.136.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.136.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.136.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.136.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.136.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.136.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.136.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.136.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.136.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.136.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.136.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-20008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20008"
}
],
"notes": [
{
"category": "general",
"text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20008",
"url": "https://www.suse.com/security/cve/CVE-2022-20008"
},
{
"category": "external",
"summary": "SUSE Bug 1199564 for CVE-2022-20008",
"url": "https://bugzilla.suse.com/1199564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-20008"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "important"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_136-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.136.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.136.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.136.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:56:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
}
]
}
SUSE-SU-2022:4617-1
Vulnerability from csaf_suse - Published: 2022-12-23 10:39 - Updated: 2022-12-23 10:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3633: Fixed a memory leak in j1939_session_destroy of the file net/can/j1939/transport.c (bsc#1204650).\n- CVE-2022-3114: Fixed a denial of service in imx_register_uart_clocks() in drivers/clk/imx/clk.c (bsc#1206391).\n- CVE-2022-3619: Fixed a memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (bsc#1204569).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-33981: Fixed a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function (bsc#1200692).\n- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).\n- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt. The manipulation leads to a race condition (bsc#1204405).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).\n- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).\n- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).\n- CVE-2022-1184: Fixed a use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (bsc#1198577).\n- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bsc#1198189).\n- CVE-2022-1882: Fixed a use-after-free flaw in free_pipe_info() that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1199904).\n- CVE-2022-20369: Fixed possible out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bsc#1202347).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed CPU information leak via post-barrier RSB predictions (bsc#1201726).\n- CVE-2022-2639: Fixed integer underflow that could lead to out-of-bounds write in reserve_sfa_size() (bsc#1202154).\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-28356: Fixed a refcount bug in llc_ui_bind and llc_ui_autobind which could allow an unprivileged user to execute a denial of service. (bsc#1197391)\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bsc#1202558).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202860).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bsc#1202623).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bsc#1202681).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed a race condition that was found in the IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bsc#1202898).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bsc#1203041).\n- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bsc#1203389).\n- CVE-2022-32250: Fixed user-after-free in net/netfilter/nf_tables_api.c that could allow local privilege escalation (bsc#1200015).\n- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bsc#1200288).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bsc#1203552).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bsc#1203769).\n- CVE-2022-3435: Fixed an out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c (bsc#1204171).\n- CVE-2022-3526: Fixed a memory leak in macvlan_handle_frame() from drivers/net/macvlan.c (bsc#1204353).\n- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bsc#1201948).\n- CVE-2022-36946: Fixed a denial of service inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bsc#1201940).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bsc#1203107).\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bsc#1203117).\n- CVE-2022-40476: Fixed a null pointer dereference in fs/io_uring.c (bsc#1203435).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bsc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bsc#1203992).\n- CVE-2022-42719: Fixed remote code execution with wlan frames when parsing a multi-BSSID element (bsc#1204051).\n- CVE-2022-42720: Fixed remote code execution due to refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Fixed remote code execution due list corruption in the wlan stack (bsc#1204060).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bsc#1199515).\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bsc#1177471)\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bsc#1196616).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bsc#1023051).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).\n- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).\n- ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).\n- ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).\n- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: extlog: Handle multiple records (git-fixes).\n- ACPI: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bsc#1203767).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).\n- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).\n- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).\n- ACPI: tables: FPDT: Do not call acpi_os_map_memory() on invalid phys address (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).\n- ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Make backlight class device registration a separate step (v2) (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ACPI: x86: Add a quirk for Dell Inspiron 14 2-in-1 for StorageD3Enable (git-fixes).\n- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).\n- ALSA: Use del_timer_sync() before freeing timer (git-fixes).\n- ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: aoa: Fix I2S device accounting (git-fixes).\n- ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).\n- ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).\n- ALSA: au88x0: use explicitly signed char (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: core: Fix double-free at snd_card_new() (git-fixes).\n- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).\n- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).\n- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).\n- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).\n- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).\n- ALSA: dmaengine: increment buffer pointer atomically (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).\n- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).\n- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).\n- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).\n- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).\n- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).\n- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).\n- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).\n- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).\n- ALSA: hda/cs_dsp_ctl: Fix mutex inversion when creating controls (bsc#1203699).\n- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).\n- ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).\n- ALSA: hda/hdmi: Fix the converter allocation for the silent stream (git-fixes).\n- ALSA: hda/hdmi: Fix the converter reuse for the silent stream (git-fixes).\n- ALSA: hda/hdmi: change type for the \u0027assigned\u0027 variable (git-fixes).\n- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).\n- ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).\n- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).\n- ALSA: hda/realtek: Add another HP ZBook G9 model quirks (bsc#1203699).\n- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).\n- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (bsc#1203922).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).\n- ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).\n- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).\n- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).\n- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).\n- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).\n- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).\n- ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).\n- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).\n- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).\n- ALSA: hda/tegra: set depop delay for tegra (git-fixes).\n- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).\n- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).\n- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).\n- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).\n- ALSA: hda: Fix position reporting on Poulsbo (git-fixes).\n- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).\n- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).\n- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).\n- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).\n- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).\n- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).\n- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).\n- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).\n- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).\n- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).\n- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).\n- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).\n- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).\n- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).\n- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).\n- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).\n- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).\n- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).\n- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).\n- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).\n- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).\n- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).\n- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).\n- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).\n- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).\n- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).\n- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).\n- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).\n- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).\n- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).\n- ALSA: hda: cs35l41: Remove suspend/resume hda hooks (bsc#1203699).\n- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).\n- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).\n- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).\n- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).\n- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).\n- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).\n- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Support System Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).\n- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).\n- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).\n- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).\n- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Ensure pwr_lock is held before reading/writing controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Minor clean and redundant code removal (bsc#1203699).\n- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: hiface: fix repeated words in comments (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: line6: Replace sprintf() with sysfs_emit() (git-fixes).\n- ALSA: line6: remove line6_set_raw declaration (git-fixes).\n- ALSA: oss: Fix potential deadlock at unregistration (git-fixes).\n- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).\n- ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).\n- ALSA: rme9652: use explicitly signed char (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 8Pre support (git-fixes).\n- ALSA: scarlett2: Add support for the internal \u0027standalone\u0027 switch (git-fixes).\n- ALSA: scarlett2: Split scarlett2_config_items[] into 3 sections (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add mixer mapping for Gigabyte B450/550 Mobos (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: Add quirk to enable Avid Mbox 3 support (git-fixes).\n- ALSA: usb-audio: Add quirks for M-Audio Fast Track C400/600 (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: Fix last interface check for registration (git-fixes).\n- ALSA: usb-audio: Fix potential memory leaks (git-fixes).\n- ALSA: usb-audio: Fix regression with Dell Dock jack detection (bsc#1204719).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Register card at the last interface (git-fixes).\n- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off \u0027manual mode\u0027 on Dell dock (git-fixes).\n- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).\n- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).\n- ALSA: usb-audio: make read-only array marker static const (git-fixes).\n- ALSA: usb-audio: remove redundant assignment to variable c (git-fixes).\n- ALSA: usb-audio: scarlett2: Use struct_size() helper in scarlett2_usb() (git-fixes).\n- ALSA: usb/6fire: fix repeated words in comments (git-fixes).\n- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).\n- ARM: 9242/1: kasan: Only map modules if CONFIG_KASAN_VMALLOC=n (git-fixes).\n- ARM: 9244/1: dump: Fix wrong pg_level in walk_pmd() (git-fixes).\n- ARM: 9247/1: mm: set readonly for MT_MEMORY_RO with ARM_LPAE (git-fixes).\n- ARM: Drop CMDLINE_* dependency on ATAGS (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: at91: rm9200: fix usb device clock id (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: decompressor: Include .data.rel.ro.local (git-fixes).\n- ARM: defconfig: clean up multi_v4t and multi_v5 configs (git-fixes).\n- ARM: defconfig: drop CONFIG_PTP_1588_CLOCK=y (git-fixes).\n- ARM: defconfig: drop CONFIG_SERIAL_OMAP references (git-fixes).\n- ARM: defconfig: drop CONFIG_USB_FSL_USB2 (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).\n- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).\n- ARM: dts: armada-38x: Add gpio-ranges for pin muxing (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: exynos: correct s5k6a3 reset polarity on Midas family (git-fixes).\n- ARM: dts: exynos: fix polarity of VBUS GPIO of Origen (git-fixes).\n- ARM: dts: fix Moxa SDIO \u0027compatible\u0027, remove \u0027sdhci\u0027 misnomer (git-fixes).\n- ARM: dts: imx6dl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).\n- ARM: dts: imx6q: add missing properties for sram (git-fixes).\n- ARM: dts: imx6qdl-gw59{10,13}: fix user pushbutton GPIO offset (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: hook up DDC i2c bus (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6qp: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sll: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sx: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: imx7d-sdb: config the max pressure for tsc2046 (git-fixes).\n- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).\n- ARM: dts: integrator: Tag PCI host with device_type (git-fixes).\n- ARM: dts: kirkwood: lsxl: fix serial line (git-fixes).\n- ARM: dts: kirkwood: lsxl: remove first ethernet port (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: turris-omnia: Add label for wan port (git-fixes).\n- ARM: dts: turris-omnia: Fix mpp26 pin name and comment (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).\n- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: SOF: pci: Change DMI match info to support all Chrome platforms (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: tx-macro: fix kcontrol put (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).\n- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).\n- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).\n- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).\n- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).\n- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).\n- ASoC: cs35l41: Binding fixes (bsc#1203699).\n- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).\n- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).\n- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).\n- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).\n- ASoC: cs35l41: Correct DSP power down (bsc#1203699).\n- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).\n- ASoC: cs35l41: Correct some control names (bsc#1203699).\n- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).\n- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).\n- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).\n- ASoC: cs35l41: DSP Support (bsc#1203699).\n- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).\n- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).\n- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).\n- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).\n- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).\n- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).\n- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).\n- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).\n- ASoC: cs35l41: Fix link problem (bsc#1203699).\n- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).\n- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).\n- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).\n- ASoC: cs35l41: Fixup the error messages (bsc#1203699).\n- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).\n- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).\n- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).\n- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).\n- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).\n- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).\n- ASoC: cs35l41: Support external boost (bsc#1203699).\n- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).\n- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).\n- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).\n- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).\n- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).\n- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).\n- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).\n- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).\n- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).\n- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).\n- ASoC: cs42l42: Handle system suspend (bsc#1203699).\n- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).\n- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).\n- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).\n- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).\n- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).\n- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).\n- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).\n- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).\n- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).\n- ASoC: cs42l42: Report initial jack state (bsc#1203699).\n- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).\n- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).\n- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).\n- ASoC: cs42l42: Use PLL for SCLK \u003e 12.288MHz (bsc#1203699).\n- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).\n- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).\n- ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() (git-fixes).\n- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).\n- ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).\n- ASoC: fsl_sai: use local device pointer (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).\n- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6359: fix tests for platform_get_irq() failure (git-fixes).\n- ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- ASoC: ops: Fix bounds check for _sx controls (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: lpass-cpu: Mark HDMI TX parity register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: mark HDMI TX registers as volatile (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: qcom: sm8250: add missing module owner (git-fixes).\n- ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: rt1019: Fix the TDM settings (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).\n- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).\n- ASoC: tas2764: Allow mono streams (git-fixes).\n- ASoC: tas2764: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2764: Fix mute/unmute (git-fixes).\n- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Reinit regcache on reset (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).\n- ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).\n- ASoC: wm_adsp: Add support for \u0027toggle\u0027 preloaders (bsc#1203699).\n- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).\n- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).\n- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).\n- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).\n- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).\n- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).\n- ASoC: wm_adsp: Handle optional legacy support (git-fixes).\n- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).\n- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).\n- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).\n- ASoC: wm_adsp: Move check for control existence (bsc#1203699).\n- ASoC: wm_adsp: Move check of dsp-\u003erunning to better place (bsc#1203699).\n- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).\n- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).\n- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).\n- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).\n- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).\n- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).\n- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).\n- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).\n- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).\n- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).\n- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).\n- ASoC: wm_adsp: remove a repeated including (bsc#1203699).\n- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol \u0027ret\u0027 (bsc#1203699).\n- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).\n- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).\n- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).\n- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).\n- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).\n- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).\n- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).\n- Bluetooth: L2CAP: Fix user-after-free (git-fixes).\n- Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: RFCOMM: Fix possible deadlock on socket shutdown/release (git-fixes).\n- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).\n- Bluetooth: SCO: Fix sco_send_frame returning skb-\u003elen (git-fixes).\n- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).\n- Bluetooth: btintel: Mark Intel controller to support LE_STATES quirk (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).\n- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).\n- Bluetooth: virtio_bt: Use skb_put to set length (git-fixes).\n- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).\n- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).\n- Documentation: PM: Drop pme_interrupt reference (git-fixes).\n- Documentation: add description for net.core.gro_normal_batch (git-fixes).\n- Documentation: add description for net.sctp.ecn_enable (git-fixes).\n- Documentation: add description for net.sctp.intl_enable (git-fixes).\n- Documentation: add description for net.sctp.reconf_enable (git-fixes).\n- Documentation: devres: add missing I2C helper (git-fixes).\n- Documentation: dm writecache: Render status list as list (git-fixes).\n- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).\n- Documentation: fix udp_wmem_min in ip-sysctl.rst (git-fixes).\n- Documentation: move watch_queue to core-api (git-fixes).\n- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).\n- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).\n- Drivers: hv: Fix syntax errors in comments (git-fixes).\n- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).\n- Drivers: hv: fix repeated words in comments (git-fixes).\n- Drivers: hv: remove duplicate word in a comment (git-fixes).\n- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).\n- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).\n- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: fix typo in comment (git-fixes).\n- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- Enable livepatching related packages on -RT (jsc#PED-1706)\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of \u0027no sensors\u0027 (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).\n- HID: hidraw: fix memory leak in hidraw_release() (git-fixes).\n- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: Add memory barriers (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: playstation: add initial DualSense Edge controller support (git-fixes).\n- HID: roccat: Fix use-after-free in roccat_read() (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: usbhid: Add ALWAYS_POLL quirk for some mice (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).\n- HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).\n- Handle variable number of SGEs in client smbdirect send (bsc#1193629).\n- IB/core: Fix a nested dead lock as part of ODP flow (git-fixes)\n- IB/hfi1: Correctly move list in sc_disable() (git-fixes)\n- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)\n- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: goodix - add compatible string for GT1158 (git-fixes).\n- Input: goodix - add support for GT1158 (git-fixes).\n- Input: goodix - try resetting the controller when no config is set (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: i8042 - fix refount leak on sparc (git-fixes).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: iqs62x-keys - drop unused device node references (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).\n- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).\n- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).\n- Input: synaptics-rmi4 - fix firmware update operations with bootloader v8 (git-fixes).\n- Input: xpad - add supported devices as contributed on github (git-fixes).\n- Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch\n- KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch\n- KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-Syn.patch\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: Move wiping of the kvm-\u003evcpus array to common code (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SEV: Mark nested locking of vcpu-\u003elock (git-fixes).\n- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Exit to userspace on ENOMEM/EFAULT GHCB errors (git-fixes).\n- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).\n- KVM: SVM: Unwind \u0027speculative\u0027 RIP advancement if INTn injection \u0027fails\u0027 (git-fixes).\n- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).\n- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).\n- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).\n- KVM: SVM: retrieve VMCB from assembly (git-fixes).\n- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).\n- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).\n- KVM: VMX: Heed the \u0027msr\u0027 argument in msr_write_intercepted() (git-fixes).\n- KVM: VMX: Inject #PF on ENCLS as \u0027emulated\u0027 #PF (git-fixes).\n- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there\u0027s no vPMU (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).\n- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Fix when shadow_root_level=5 \u0026\u0026 guest root_level\u0026lt;4 (git-fixes).\n- KVM: X86: Use vcpu-\u003earch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized \u0027fault.async_page_fault\u0027 from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: fix avic_set_running for preemptable kernels (git-fixes).\n- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).\n- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).\n- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).\n- KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS (git-fixes).\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: Unconditionally purge queued/injected events on nested \u0027exit\u0027 (git-fixes).\n- KVM: nVMX: do not use vcpu-\u003earch.efer when checking host state on nested state load (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).\n- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: do not present the ecall interrupt twice (bsc#1203229 LTC#199905).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: s390x: fix SCK locking (git-fixes).\n- KVM: selftests: Make sure kvm_create_max_vcpus test won\u0027t hit RLIMIT_NOFILE (git-fixes).\n- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).\n- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).\n- KVM: x86/mmu: Do not advance iterator after restart due to yielding (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).\n- KVM: x86/mmu: Move \u0027invalid\u0027 check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Retry page fault if root is invalidated by memslot update (git-fixes).\n- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86/pmu: Add pmc-\u003eintr to refactor kvm_perf_overflow{_intr}() (git-fixes).\n- KVM: x86/pmu: Do not truncate the PerfEvtSeln MSR when creating a perf event (git-fixes).\n- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).\n- KVM: x86/pmu: Fix available_event_types check for REF_CPU_CYCLES event (git-fixes).\n- KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).\n- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).\n- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).\n- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).\n- KVM: x86: Add KVM_CAP_ENABLE_CAP to x86 (git-fixes).\n- KVM: x86: Add compat handler for KVM_X86_SET_MSR_FILTER (git-fixes).\n- KVM: x86: Always set kvm_run-\u003eif_flag (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn\u0027t activated (git-fixes).\n- KVM: x86: Forcibly leave nested virt when SMM state is toggled (git-fixes).\n- KVM: x86: Fully initialize \u0027struct kvm_lapic_irq\u0027 in kvm_pv_kick_cpu_op() (git-fixes).\n- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).\n- KVM: x86: Inject #UD on emulated XSETBV if XSAVES isn\u0027t enabled (git-fixes).\n- KVM: x86: Keep MSR_IA32_XSS unchanged for INIT (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).\n- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: x86: Register perf callbacks after calling vendor\u0027s hardware_setup() (git-fixes).\n- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).\n- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT \u0026\u0026 !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).\n- KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time (git-fixes).\n- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).\n- KVM: x86: Update vPMCs when retiring branch instructions (git-fixes).\n- KVM: x86: Update vPMCs when retiring instructions (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).\n- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: do not report preemption if the steal time cache is stale (git-fixes).\n- KVM: x86: emulator: em_sysexit should update ctxt-\u003emode (git-fixes).\n- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).\n- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).\n- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_send_ipi() (git-fixes).\n- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM (git-fixes).\n- KVM: x86: nSVM: fix potential NULL derefernce on nested migration (git-fixes).\n- KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- KVM: x86: use a separate asm-offsets.c file (git-fixes).\n- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).\n- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).\n- NFS: Fix another fsync() issue after a server reboot (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Clean up the show_nf_flags() macro (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).\n- NFSv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFSv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFSv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFSv4.2 fix problems with __nfs42_ssc_open (git-fixes).\n- NFSv4.2: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).\n- NFSv4: Fix races in the legacy idmapper upcall (git-fixes).\n- NFSv4: Fixes for nfs4_inode_return_delegation() (git-fixes).\n- NFSv4: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/ASPM: Correct LTR_L1.2_THRESHOLD computation (git-fixes).\n- PCI/ASPM: Ignore L1 PM Substates if device lacks capability (git-fixes).\n- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: Correct misspelled words (git-fixes).\n- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).\n- PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).\n- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).\n- PCI: Prefer \u0027unsigned int\u0027 over bare \u0027unsigned\u0027 (git-fixes).\n- PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if \u0027snps,enable-cdm-check\u0027 exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- PCI: mediatek-gen3: Change driver name to mtk-pcie-gen3 (git-fixes).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).\n- PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)\n- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)\n- RDMA/cma: Fix arguments order in net device validation (git-fixes)\n- RDMA/cma: Use output interface for net_dev check (git-fixes)\n- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)\n- RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)\n- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)\n- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)\n- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)\n- RDMA/hns: Add the detection for CMDQ status in the device initialization process (git-fixes)\n- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)\n- RDMA/hns: Disable local invalidate operation (git-fixes)\n- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)\n- RDMA/hns: Fix supported page size (git-fixes)\n- RDMA/hns: Fix wrong fixed value of qp-\u003erq.wqe_shift (git-fixes)\n- RDMA/hns: Remove magic number (git-fixes)\n- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)\n- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)\n- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)\n- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)\n- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)\n- RDMA/irdma: Add support for address handle re-use (git-fixes)\n- RDMA/irdma: Align AE id codes to correct flush code and event (git-fixes)\n- RDMA/irdma: Do not advertise 1GB page size for x722 (git-fixes)\n- RDMA/irdma: Fix VLAN connection with wildcard address (git-fixes)\n- RDMA/irdma: Fix a window for use-after-free (git-fixes)\n- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)\n- RDMA/irdma: Fix setting of QP context err_rq_idx_valid field (git-fixes)\n- RDMA/irdma: Fix sleep from invalid context BUG (git-fixes)\n- RDMA/irdma: Move union irdma_sockaddr to header file (git-fixes)\n- RDMA/irdma: Remove the unnecessary variable saddr (git-fixes)\n- RDMA/irdma: Report RNR NAK generation in device caps (git-fixes)\n- RDMA/irdma: Report the correct max cqes from query device (git-fixes)\n- RDMA/irdma: Return correct WC error for bind operation failure (git-fixes)\n- RDMA/irdma: Return error on MR deregister CQP failure (git-fixes)\n- RDMA/irdma: Use net_type to check network type (git-fixes)\n- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)\n- RDMA/irdma: Validate udata inlen and outlen (git-fixes)\n- RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes)\n- RDMA/mlx5: Do not compare mkey tags in DEVX indirect mkey (git-fixes)\n- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)\n- RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)\n- RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)\n- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)\n- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)\n- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)\n- RDMA/rxe: Fix \u0027kernel NULL pointer dereference\u0027 error (git-fixes)\n- RDMA/rxe: Fix deadlock in rxe_do_local_ops() (git-fixes)\n- RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)\n- RDMA/rxe: Fix mw bind to allow any consumer key portion (git-fixes)\n- RDMA/rxe: Fix resize_finish() in rxe_queue.c (git-fixes)\n- RDMA/rxe: Fix rnr retry behavior (git-fixes)\n- RDMA/rxe: Fix the error caused by qp-\u003esk (git-fixes)\n- RDMA/rxe: For invalidate compare according to set keys in mr (git-fixes)\n- RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)\n- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)\n- RDMA/rxe: Remove useless pkt parameters (git-fixes)\n- RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)\n- RDMA/siw: Fix QP destroy to wait for all references dropped. (git-fixes)\n- RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)\n- RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)\n- RDMA/srp: Fix srp_abort() (git-fixes)\n- RDMA/srp: Handle dev_set_name() failure (git-fixes)\n- RDMA/srp: Rework the srp_add_port() error path (git-fixes)\n- RDMA/srp: Set scmnd-\u003eresult only when scmnd is not NULL (git-fixes)\n- RDMA/srp: Support more than 255 rdma ports (git-fixes)\n- RDMA/srp: Use the attribute group mechanism for sysfs attributes (git-fixes)\n- RDMA/srpt: Duplicate port name members (git-fixes)\n- RDMA/srpt: Fix a use-after-free (git-fixes)\n- RDMA/srpt: Introduce a reference count in struct srpt_device (git-fixes)\n- RDMA/usnic: fix set-but-not-unused variable \u0027flags\u0027 warning (git-fixes)\n- RDMA: remove useless condition in siw_create_cq() (git-fixes)\n- Reduce client smbdirect max receive segment size (bsc#1193629).\n- Refresh nvme in-band authentication patches (bsc#1199086)\n- Refresh patches.suse/iommu-vt-d-Acquiring-lock-in-domain-ID-allocation-helpers Fix spin deadlock in intel_iommu (bsc#1203505)\n- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch (bsc#1202131) Now iwlwifi queries *-72.ucode, but again, this is non-existing version. Correct to the existing *-71.ucode\n- Refresh patches.suse/ppc64-kdump-Limit-kdump-base-to-512MB.patch to upstream version.\n- Remove doubly applied amdgpu patches\n- Replace the in-house patch by the above upstream version, patches.suse/md-raid0-fix-buffer-overflow-at-debug-print.patch.\n- Revert \u0027ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations\u0027 (bsc#1203699).\n- Revert \u0027ALSA: usb-audio: Split endpoint setups for hw_params and prepare\u0027 (git-fixes).\n- Revert \u0027SUNRPC: Remove unreachable error condition\u0027 (git-fixes).\n- Revert \u0027arm64: Mitigate MTE issues with str{n}cmp()\u0027 (git-fixes)\n- Revert \u0027clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops\u0027 (git-fixes).\n- Revert \u0027constraints: increase disk space for all architectures\u0027 (bsc#1203693). This reverts commit 43a9011f904bc7328d38dc340f5e71aecb6b19ca.\n- Revert \u0027crypto: qat - reduce size of mapped region\u0027 (git-fixes).\n- Revert \u0027drivers/video/backlight/platform_lcd.c: add support for device tree based probe\u0027 (git-fixes).\n- Revert \u0027drm/amdgpu: use dirty framebuffer helper\u0027 (git-fixes).\n- Revert \u0027drm/i915: Hold reference to intel_context over life of i915_request\u0027 (git-fixes).\n- Revert \u0027drm/udl: Kill pending URBs at suspend and disconnect\u0027 (bsc#1195917).\n- Revert \u0027drm/vc4: hvs: Reset muxes at probe time (git-fixes).\u0027 (bsc#1202341) This reverts commit 303122d0f2160411fa1068220bc59849d848550d. The reverted change clears hardware state on the RPi4, which leaves the screen blank. Without it, the display works correctly.\n- Revert \u0027drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time\u0027 (git-fixes).\n- Revert \u0027firmware: arm_scmi: Add clock management to the SCMI power domain\u0027 (git-fixes).\n- Revert \u0027ice: Hide bus-info in ethtool for PRs in switchdev mode\u0027 (git-fixes).\n- Revert \u0027ipv6: Honor all IPv6 PIO Valid Lifetime values\u0027 (bsc#1202989).\n- Revert \u0027net: phy: meson-gxl: improve link-up behavior\u0027 (git-fixes).\n- Revert \u0027net: usb: ax88179_178a needs FLAG_SEND_ZLP\u0027 (git-fixes).\n- Revert \u0027pNFS: nfs3_set_ds_client should set NFS_CS_NOPING\u0027 (git-fixes).\n- Revert \u0027powerpc/rtas: Implement reentrant rtas call\u0027 (bsc#1203664 ltc#199236).\n- Revert \u0027scripts/mod/modpost.c: permit \u0027.cranges\u0027 secton for sh64 architecture.\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: avoid call of sleeping functions from atomic context\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: replace kicktimer with delayed_work\u0027 (git-fixes).\n- Revert \u0027usb: add quirks for Lenovo OneLink+ Dock\u0027 (git-fixes).\n- Revert \u0027usb: dwc3: disable USB core PHY management\u0027 (git-fixes).\n- Revert \u0027usb: gadget: udc-xilinx: replace memcpy with memcpy_toio\u0027 (git-fixes).\n- Revert \u0027usb: storage: Add quirk for Samsung Fit flash\u0027 (git-fixes).\n- Revert \u0027workqueue: remove unused cancel_work()\u0027 (bsc#1204933).\n- Revert \u0027x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV\u0027 (bsc#1190497).\n- Revert selftest patches that have been reverted in stable-5.15.y\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: Fix NFSD\u0027s request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Fix xdr_encode_bool() (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).\n- USB: bcma: Make GPIO explicitly optional (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add Quectel RM520N (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).\n- XArray: Update the LRU list in xas_split() (git-fixes).\n- add another bug reference to some hyperv changes (bsc#1205617).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arcnet: fix potential memory leak in com20020_probe() (git-fixes).\n- arm64/bti: Disable in kernel BTI when cross section thunks are broken (git-fixes)\n- arm64/mm: Consolidate TCR_EL1 fields (git-fixes).\n- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).\n- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: imx8: correct clock order (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mp: Add snps,gfladj-refclk-lpm-sel quirk to USB nodes (git-fixes).\n- arm64: dts: imx8mq-librem5: Add bq25895 as max17055\u0027s power supply (git-fixes).\n- arm64: dts: juno: Add thermal critical trip points (git-fixes).\n- arm64: dts: ls1088a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: ls208xa: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: lx2160a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sc7280: Cleanup the lpasscc node (git-fixes).\n- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes).\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).\n- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).\n- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).\n- arm64: dts: ti: k3-j7200: fix main pinmux range (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).\n- arm64: entry: avoid kprobe recursion (git-fixes).\n- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.\n- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too\n- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: fix rodata=full again (git-fixes)\n- arm64: ftrace: fix module PLTs with mcount (git-fixes).\n- arm64: kasan: Revert \u0027arm64: mte: reset the page tag in page-\u003eflags\u0027 (git-fixes).\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: lib: Import latest version of Arm Optimized Routines\u0027 strcmp (git-fixes)\n- arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored (git-fixes).\n- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).\n- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).\n- arm64: topology: move store_cpu_topology() to shared code (git-fixes).\n- arm_pmu: Validate single/group leader events (git-fixes).\n- asm-generic: remove a broken and needless ifdef conditional (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: ahci-imx: Fix MODULE_ALIAS (git-fixes).\n- ata: fix ata_id_has_devslp() (git-fixes).\n- ata: fix ata_id_has_dipm() (git-fixes).\n- ata: fix ata_id_has_ncq_autosense() (git-fixes).\n- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).\n- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).\n- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).\n- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).\n- bitfield.h: Fix \u0027type of reg too small for mask\u0027 test (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-mq: fix io hung due to missing commit_rqs (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).\n- block: Do not reread partition table on exclusively open device (bsc#1190969).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: add bio_start_io_acct_time() to control start_time (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: drop unused includes in \u0026lt;linux/genhd.h\u003e (git-fixes).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- bnx2x: fix built-in kernel driver load failure (git-fixes).\n- bnx2x: fix driver load from initrd (git-fixes).\n- bnxt_en: Fix bnxt_refclk_read() (git-fixes).\n- bnxt_en: Fix bnxt_reinit_after_abort() code path (git-fixes).\n- bnxt_en: fix livepatch query (git-fixes).\n- bnxt_en: reclaim max resources if sriov enable fails (git-fixes).\n- bonding: 802.3ad: fix no transmission of LACPDUs (git-fixes).\n- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers (git-fixes).\n- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).\n- btrfs-fix-deadlock-between-quota-enable-and-other-qu.patch: (bsc#1205521).\n- btrfs: check if root is readonly while setting security xattr (bsc#1206147).\n- btrfs: do not allow compression on nodatacow files (bsc#1206149).\n- btrfs: export a helper for compression hard check (bsc#1206149).\n- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).\n- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).\n- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).\n- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).\n- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).\n- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).\n- btrfs: send: use boolean types for current inode status (bsc#1206036).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- ca8210: Fix crash by zero initializing data (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).\n- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: do not increase rx statistics when generating a CAN rx error message frame (git-fixes).\n- can: do not increase rx_bytes statistics for RTR frames (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).\n- can: gs_usb: gs_can_open(): fix race dev-\u003ecan.state condition (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: j1939: transport: j1939_session_skb_drop_old(): spin_unlock_irqrestore() before kfree_skb() (git-fixes).\n- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).\n- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).\n- can: kvaser_usb: kvaser_usb_leaf: fix CAN clock frequency regression (git-fixes).\n- can: kvaser_usb: make use of units.h in assignment of frequency (git-fixes).\n- can: kvaser_usb: replace run-time checks with struct kvaser_usb_driver_info (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).\n- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: m_can: Add check for devm_clk_get (git-fixes).\n- can: m_can: fix typo prescalar -\u003e prescaler (git-fixes).\n- can: m_can: is_lec_err(): clean up LEC error handling (git-fixes).\n- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251x: mcp251x_can_probe(): add missing unregister_candev() in error path (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix endianness conversion (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): use correct length to read dev_id (git-fixes).\n- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).\n- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).\n- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).\n- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).\n- ceph: properly handle statfs on multifs setups (bsc#1206045).\n- ceph: switch netfs read ops to use rreq-\u003einode instead of rreq-\u003emapping-\u003ehost (bsc#1206046).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).\n- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).\n- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).\n- cgroup: Fix threadgroup_rwsem \u0026lt;-\u003e cpus_read_lock() deadlock (bsc#1196869).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).\n- cifs: Add constructor/destructors for tcon-\u003ecfid (bsc#1193629).\n- cifs: Add helper function to check smb1+ server (bsc#1193629).\n- cifs: Do not access tcon-\u003ecfids-\u003ecfid directly from is_path_accessible (bsc#1193629).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1193629).\n- cifs: Fix connections leak when tlink setup failed (git-fixes).\n- cifs: Fix memory leak on the deferred close (bsc#1193629).\n- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).\n- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).\n- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).\n- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).\n- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).\n- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).\n- cifs: Fix xid leak in cifs_create() (bsc#1193629).\n- cifs: Fix xid leak in cifs_flock() (bsc#1193629).\n- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).\n- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).\n- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).\n- cifs: Move cached-dir functions into a separate file (bsc#1193629).\n- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).\n- cifs: Use after free in debug code (git-fixes).\n- cifs: Use help macro to get the header preamble size (bsc#1193629).\n- cifs: Use help macro to get the mid header size (bsc#1193629).\n- cifs: add check for returning value of SMB2_close_init (git-fixes).\n- cifs: add check for returning value of SMB2_set_info_init (git-fixes).\n- cifs: add missing spinlock around tcon refcount (bsc#1193629).\n- cifs: alloc_mid function should be marked as static (bsc#1193629).\n- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).\n- cifs: always iterate smb sessions using primary channel (bsc#1193629).\n- cifs: avoid deadlocks while updating iface (bsc#1193629).\n- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).\n- cifs: avoid use of global locks for high contention data (bsc#1193629).\n- cifs: cache the dirents for entries in a cached directory (bsc#1193629).\n- cifs: change iface_list from array to sorted linked list (bsc#1193629).\n- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).\n- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).\n- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).\n- cifs: during reconnect, update interface if necessary (bsc#1193629).\n- cifs: enable caching of directories for which a lease is held (bsc#1193629).\n- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).\n- cifs: fix double-fault crash during ntlmssp (bsc#1193629).\n- cifs: fix lock length calculation (bsc#1193629).\n- cifs: fix memory leaks in session setup (bsc#1193629).\n- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).\n- cifs: fix race condition with delayed threads (bsc#1193629).\n- cifs: fix reconnect on smb3 mount types (bsc#1201427).\n- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).\n- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).\n- cifs: fix static checker warning (bsc#1193629).\n- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).\n- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).\n- cifs: fix use-after-free on the link name (bsc#1193629).\n- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).\n- cifs: improve handlecaching (bsc#1193629).\n- cifs: improve symlink handling for smb2+ (bsc#1193629).\n- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).\n- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).\n- cifs: list_for_each() -\u003e list_for_each_entry() (bsc#1193629).\n- cifs: misc: fix spelling typo in comment (bsc#1193629).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).\n- cifs: periodically query network interfaces from server (bsc#1193629).\n- cifs: populate empty hostnames for extra channels (bsc#1193629).\n- cifs: prevent copying past input buffer boundaries (bsc#1193629).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1193629).\n- cifs: remove initialization value (bsc#1193629).\n- cifs: remove minor build warning (bsc#1193629).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).\n- cifs: remove remaining build warnings (bsc#1193629).\n- cifs: remove some camelCase and also some static build warnings (bsc#1193629).\n- cifs: remove unnecessary (void*) conversions (bsc#1193629).\n- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).\n- cifs: remove unnecessary type castings (bsc#1193629).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).\n- cifs: remove useless DeleteMidQEntry() (bsc#1193629).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1193629).\n- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).\n- cifs: return correct error in -\u003ecalc_signature() (bsc#1193629).\n- cifs: return errors during session setup during reconnects (bsc#1193629).\n- cifs: revalidate mapping when doing direct writes (bsc#1193629).\n- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).\n- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).\n- cifs: skip extra NULL byte in filenames (bsc#1193629).\n- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).\n- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).\n- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: use ALIGN() and round_up() macros (bsc#1193629).\n- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).\n- cifs: when a channel is not found for server, log its connection id (bsc#1193629).\n- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).\n- clk: ast2600: BCLK comes from EPLL (git-fixes).\n- clk: at91: fix the build with binutils 2.27 (git-fixes).\n- clk: baikal-t1: Add SATA internal ref clock buffer (git-fixes).\n- clk: baikal-t1: Add shared xGMAC ref/ptp clocks internal parent (git-fixes).\n- clk: baikal-t1: Fix invalid xGMAC PTP clock divider (git-fixes).\n- clk: bcm2835: Make peripheral PLLC critical (git-fixes).\n- clk: bcm2835: Round UART input clock up (bsc#1188238)\n- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).\n- clk: bcm: rpi: Add support for VEC clock (bsc#1196632)\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).\n- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).\n- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: imx: scu: fix memleak on platform_device_add() fails (git-fixes).\n- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: meson: Hold reference returned by of_get_parent() (git-fixes).\n- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).\n- clk: qcom: apss-ipq6018: mark apcs_alias0_core_clk as critical (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver\u0027s init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: sprd: Hold reference returned by of_get_parent() (git-fixes).\n- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).\n- clk: vc5: Fix 5P49V6901 outputs disabling when enabling FOD (git-fixes).\n- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).\n- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).\n- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.\n- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).\n- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).\n- cpufreq: qcom: fix memory leak in error path (git-fixes).\n- cpufreq: qcom: fix writes in read-only memory region (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).\n- crypto: akcipher - default implementation for setting a private key (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: cavium - prevent integer overflow loading firmware (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: inside-secure - Change swab to swab32 (git-fixes).\n- crypto: inside-secure - Replace generic aes with libaes (git-fixes).\n- crypto: marvell/octeontx - prevent integer overflows (git-fixes).\n- crypto: qat - fix default value of WDT timer (git-fixes).\n- crypto: sahara - do not sleep when in softirq (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)\n- device property: Check fwnode-\u003esecondary when finding properties (git-fixes).\n- device property: Fix documentation for *_match_string() APIs (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm btree remove: fix use after free in rebalance_children() (git-fixes).\n- dm crypt: make printing of the key constant-time (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm stats: add cond_resched when looping over entries (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: fix double accounting of flush with data (git-fixes).\n- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).\n- dm: properly fix redundant bio-based IO accounting (git-fixes).\n- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).\n- dma-debug: make things less spammy under memory pressure (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).\n- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).\n- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).\n- dmaengine: at_hdmac: Protect atchan-\u003estatus with the channel lock (git-fixes).\n- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: hisilicon: Add multi-thread support for a DMA channel (git-fixes).\n- dmaengine: hisilicon: Disable channels when unregister hisi_dma (git-fixes).\n- dmaengine: hisilicon: Fix CQ head update (git-fixes).\n- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).\n- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).\n- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).\n- dmaengine: idxd: change bandwidth token to read buffers (jsc#PED-679).\n- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).\n- dmaengine: idxd: deprecate token sysfs attributes for read buffers (jsc#PED-679).\n- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).\n- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).\n- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).\n- dmaengine: idxd: force wq context cleanup on device disable path (git-fixes).\n- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).\n- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).\n- dmaengine: idxd: int handle management refactoring (jsc#PED-682).\n- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).\n- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).\n- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).\n- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).\n- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: mxs: use platform_driver_register (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).\n- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).\n- dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow (git-fixes).\n- dmaengine: xilinx_dma: Fix devm_platform_ioremap_resource error handling (git-fixes).\n- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).\n- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).\n- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).\n- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).\n- docs/kernel-parameters: Update descriptions for \u0027mitigations=\u0027 param with retbleed (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- dpaa2-eth: trace the allocated address instead of page struct (git-fixes).\n- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: serial: jsm: fix some leaks in probe (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).\n- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).\n- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Assume an LTTPR is always present on fixed_vs links (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Changed pipe split policy to allow for multi-display (bsc#1152472) Backporting notes: \t* remove changes to non-existing 201 and 31 directories\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Correct MPC split policy for DCN301 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix build breakage with CONFIG_DEBUG_FS=n (git-fixes).\n- drm/amd/display: Fix double cursor on non-video RGB MPO (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: Fix vblank refcount in vrr transition (git-fixes).\n- drm/amd/display: For stereo keep \u0027FLIP_ANY_FRAME\u0027 (git-fixes).\n- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amd/display: Mark dml30\u0027s UseMinimumDCFCLK() as noinline for stack usage (git-fixes).\n- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateFlipSchedule() (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).\n- drm/amd/display: Remove interface for periodic interrupt 1 (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert \u0027drm/amd/display: turn DPMS off on connector unplug\u0027 (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/display: skip audio setup when audio stream is enabled (git-fixes).\n- drm/amd/display: update gamut remap if plane has changed (git-fixes).\n- drm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).\n- drm/amd/pm: smu7_hwmgr: fix potential off-by-one overflow in \u0027performance_levels\u0027 (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.0 (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.1 (git-fixes).\n- drm/amdgpu/gfx10: add wraparound gpu counter check for APUs as well (bsc#1152472) Backporting notes: \t* also fix default branch\n- drm/amdgpu/gfx9: switch to golden tsc registers for renoir+ (bsc#1152472) Backporting notes: \t* replace IP_VERSION() with CHIP_ constants\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).\n- drm/amdgpu: add missing pci_disable_device() in amdgpu_pmops_runtime_resume() (git-fixes).\n- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: fix initial connector audio value (git-fixes).\n- drm/amdgpu: fix sdma doorbell init ordering on APUs (git-fixes).\n- drm/amdgpu: make sure to init common IP before gmc (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).\n- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV case (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).\n- drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() (git-fixes).\n- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).\n- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).\n- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).\n- drm/bridge: Avoid uninitialized variable warning (git-fixes).\n- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).\n- drm/bridge: lt8912b: add vsync hsync (git-fixes).\n- drm/bridge: lt8912b: fix corrupted image output (git-fixes).\n- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver\u0027s work (git-fixes).\n- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).\n- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).\n- drm/hyperv: Add ratelimit on error message (git-fixes).\n- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/dp: Reset frl trained flag before restarting FRL training (git-fixes).\n- drm/i915/ehl: Update MOCS table for EHL (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).\n- drm/i915/hdmi: convert intel_hdmi_to_dev to intel_hdmi_to_i915 (bsc#1152489) Backporting notes: \t* update additional patch on top\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).\n- drm/i915: Reject unsupported TMDS rates on ICL+ (git-fixes).\n- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/komeda: Fix handling of atomic commits in the atomic_commit_tail hook (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).\n- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/meson: explicitly remove aggregate driver at module unload time (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/mipi-dsi: Detach devices when removing the host (git-fixes).\n- drm/msm/dp: Silence inconsistent indent warning (git-fixes).\n- drm/msm/dp: correct 1.62G link rate at dp_catalog_ctrl_config_msa() (git-fixes).\n- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).\n- drm/msm/dp: fix IRQ lifetime (git-fixes).\n- drm/msm/dpu: Fix comment typo (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dpu: index dpu_kms-\u003ehw_vbif using vbif_idx (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/hdmi: drop empty \u0027none\u0027 regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/hdmi: fix IRQ lifetime (git-fixes).\n- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).\n- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).\n- drm/msm: fix use-after-free on probe deferral (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms/nv140-: Disable interlacing (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/nouveau: wait for the exclusive fence after the shared ones v2 (bsc#1152472) Backporting notes: \t* context changes\n- drm/omap: dss: Fix refcount leak bugs (git-fixes).\n- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/scheduler: quieten kernel-doc warnings (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm/virtio: Check whether transferred 2D BO is shmem (git-fixes).\n- drm/virtio: Unlock reservations on virtio_gpu_object_shmem_init() error (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).\n- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).\n- drm: bridge: dw_hdmi: only trigger hotplug event on link change (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- drm: fix drm_mipi_dbi build errors (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).\n- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing clocks properties (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing dma-ranges (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: clocks: imx8mp: Add ID for usb suspend clock (git-fixes).\n- dt-bindings: crypto: ti,sa2ul: drop dma-coherent property (git-fixes).\n- dt-bindings: display/msm: dpu-sc7180: add missing DPU opp-table (git-fixes).\n- dt-bindings: display/msm: dpu-sdm845: add missing DPU opp-table (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: hwmon: (mr75203) fix \u0027intel,vm-map\u0027 property to be optional (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix compatible string (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix maximum chip select value (git-fixes).\n- dt-bindings: phy: qcom,qmp-usb3-dp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: phy: qcom,qmp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: power: gpcv2: add power-domains property (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- dyndbg: fix module.dyndbg handling (git-fixes).\n- dyndbg: fix static_branch manipulation (git-fixes).\n- dyndbg: let query-modname override actual module name (git-fixes).\n- e1000e: Fix TX dispatch condition (git-fixes).\n- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- efi/tpm: Pass correct address to memblock_reserve (git-fixes).\n- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- efi: libstub: Disable struct randomization (git-fixes).\n- efi: libstub: drop pointless get_memory_map() call (git-fixes).\n- efi: random: Use \u0027ACPI reclaim\u0027 memory for random seed (git-fixes).\n- efi: random: reduce seed size to 32 bytes (git-fixes).\n- erofs: fix deadlock when shrink erofs slab (git-fixes).\n- eth: alx: take rtnl_lock on resume (git-fixes).\n- eth: sun: cassini: remove dead code (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).\n- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).\n- exfat: Drop superfluous new line for error messages (bsc#1201725).\n- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix referencing wrong parent directory information after renaming (git-fixes).\n- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).\n- exfat: use updated exfat_chain directly during renaming (git-fixes).\n- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: avoid BUG_ON when creating xattrs (bsc#1205496).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769). Refresh ext4-fix-race-condition-between-ext4_write-and-ext4_.patch\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in \u0027__ext4_journal_ensure_credits\u0027 (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: \t* context fixes in other patch \t* update config\n- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).\n- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- fec: Fix timer capture timing in `fec_ptp_enable_pps()` (git-fixes).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).\n- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).\n- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).\n- firmware: arm_scmi: Harden accesses to the sensor domains (git-fixes).\n- firmware: arm_scmi: Improve checks in the info_get operations (git-fixes).\n- firmware: arm_scmi: Make Rx chan_setup fail on memory errors (git-fixes).\n- firmware: arm_scmi: Suppress the driver\u0027s bind attributes (git-fixes).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: coreboot: Register bus in module init (git-fixes).\n- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).\n- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).\n- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).\n- firmware: cs_dsp: Add pre_run callback (bsc#1203699).\n- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).\n- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).\n- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).\n- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).\n- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).\n- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).\n- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).\n- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).\n- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).\n- firmware: cs_dsp: Print messages from bin files (bsc#1203699).\n- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).\n- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).\n- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fm10k: Fix error handling in fm10k_init_module() (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- fs/binfmt_elf: Fix memory leak in load_elf_binary() (git-fixes).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203798).\n- fuse: add file_modified() to fallocate (bsc#1205332).\n- fuse: fix deadlock between atomic O_TRUNC and page invalidation (bsc#1204533).\n- fuse: fix readdir cache race (bsc#1205331).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- gcov: support GCC 12.1 and newer compilers (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: amd8111: Fix PCI device reference count leak (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).\n- gpio: mockup: remove gpio debugfs when remove device (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).\n- gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- hinic: Avoid some over memory allocation (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).\n- hv_sock: Check hv_pkt_iter_first_raw()\u0027s return value (git-fixes).\n- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).\n- hwmon/coretemp: Handle large core ID value (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).\n- hwmon: (ltc2947) fix temperature scaling (git-fixes).\n- hwmon: (mr75203) enable polling for all VM channels (git-fixes).\n- hwmon: (mr75203) fix VM sensor allocation when \u0027intel,vm-map\u0027 not defined (git-fixes).\n- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).\n- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).\n- hwmon: (mr75203) update pvt-\u003ev_num and vm_num to the actual number of used sensors (git-fixes).\n- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- hwmon: (sht4x) do not overflow clamping operation on 32-bit platforms (git-fixes).\n- hwmon: (tps23861) fix byte order in resistance register (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: designware: Fix handling of real but unexpected device interrupts (git-fixes).\n- i2c: i801: Add support for Intel Ice Lake PCH-N (jsc#PED-634).\n- i2c: i801: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- i2c: i801: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- i2c: i801: Improve handling of chip-specific feature definitions (jsc#PED-634).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).\n- i2c: mlxbf: Fix frequency calculation (git-fixes).\n- i2c: mlxbf: incorrect base address passed during io write (git-fixes).\n- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).\n- i2c: mlxbf: support lock mechanism (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- i2c: piix4: Fix adapter not be removed in piix4_remove() (git-fixes).\n- i2c: qcom-cci: Fix ordering of pm_runtime_xx and i2c_add_adapter (git-fixes).\n- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).\n- i2c: xiic: Add platform module alias (git-fixes).\n- i40e: Fix call trace in setup_tx_descriptors (git-fixes).\n- i40e: Fix dropped jumbo frames statistics (git-fixes).\n- i40e: Fix to stop tx_timeout recovery if GLOBR fails (git-fixes).\n- iavf: Fix adminq error handling (git-fixes).\n- iavf: Fix handling of dummy receive descriptors (git-fixes).\n- iavf: Fix reset error handling (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ice: Allow operation with reduced device MSI-X (bsc#1201987).\n- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).\n- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).\n- ice: Fix race during aux device (un)plugging (git-fixes).\n- ice: Fix switchdev rules book keeping (git-fixes).\n- ice: Match on all profiles in slow-path (git-fixes).\n- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).\n- ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS) (git-fixes).\n- ice: do not setup vlan for loopback VSI (git-fixes).\n- ice: fix \u0027scheduling while atomic\u0027 on aux critical err interrupt (git-fixes).\n- ice: fix crash when writing timestamp on RX rings (git-fixes).\n- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- igb: Make DMA faster when CPU is active on the PCIe link (git-fixes).\n- igb: fix a use-after-free issue in igb_clean_tx_ring (git-fixes).\n- igb: skip phy status check where unavailable (git-fixes).\n- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: fix channel readings for some variants (git-fixes).\n- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).\n- iio: adc: at91-sama5d2_adc: disable/prepare buffer on suspend/resume (git-fixes).\n- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).\n- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: mcp3911: use correct id bits (git-fixes).\n- iio: adc: mp2629: fix potential array out of bound access (git-fixes).\n- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: adxl372: Fix unsafe buffer attributes (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: bmc150-accel-core: Fix unsafe buffer attributes (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: inkern: fix return value in devm_of_iio_channel_get_by_name() (git-fixes).\n- iio: inkern: only release the device node when done with it (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: light: tsl2583: Fix module unloading (git-fixes).\n- iio: ltc2497: Fix reading conversion results (git-fixes).\n- iio: magnetometer: yas530: Change data type of hard_offsets to signed (git-fixes).\n- iio: ms5611: Simplify IO callback parameters (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: pressure: dps310: Refactor startup procedure (git-fixes).\n- iio: pressure: dps310: Reset chip after timeout (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: pressure: ms5611: fixed value compensation bug (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- iio: temperature: ltc2983: allocate iio channels once (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- ima: fix blocking of security.ima xattrs of unsupported algorithms (git-fixes).\n- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).\n- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).\n- intel_idle: Add AlderLake support (jsc#PED-824).\n- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).\n- intel_idle: Fix the \u0027preferred_cstates\u0027 module parameter (jsc#PED-824 jsc#PED-1936).\n- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).\n- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).\n- io-wq: ensure we exit if thread group is exiting (git-fixes).\n- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).\n- io-wq: fix cancellation on create-worker failure (bnc#1205113).\n- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: correct __must_hold annotation (git-fixes).\n- io_uring: drop ctx-\u003euring_lock before acquiring sqd-\u003elock (git-fixes).\n- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).\n- io_uring: fix io_timeout_remove locking (git-fixes).\n- io_uring: fix missing mb() before waitqueue_active (git-fixes).\n- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).\n- io_uring: fix possible poll event lost in multi shot mode (git-fixes).\n- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Do not falsely log intel_iommu is unsupported kernel option (bsc#1204947).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).\n- iov_iter: fix build issue due to possible type mis-match (git-fixes).\n- ip: Fix data-races around sysctl_ip_fwd_update_priority (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- ipv4: Fix data-races around sysctl_fib_multipath_hash_policy (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).\n- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn\u0027t supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn\u0027t allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate \u0026 flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm-\u003efwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero (git-fixes).\n- ixgbe: fix bcast packets Rx on VF after promisc removal (git-fixes).\n- ixgbe: fix unexpected VLAN Rx in promisc mode on VF (git-fixes).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI workaround for spi changes (bsc#1203699).\n- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kABI: Fix kABI after \u0027KVM: x86/pmu: Use different raw event masks for AMD and Intel\u0027 (git-fixes).\n- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).\n- kABI: Fix kABI after backport Add pmc-\u003eintr to refactor kvm_perf_overflow{_intr}() (git-fixes).\n- kABI: Fix kABI after backport Always set kvm_run-\u003eif_flag (git-fixes).\n- kABI: Fix kABI after backport Forcibly leave nested virt when SMM state is toggled (git-fixes).\n- kABI: Fix kABI after backport Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).\n- kABI: fix adding another field to scsi_device (bsc#1203039).\n- kABI: reintroduce a non-inline usleep_range (git-fixes).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: Exclude ppc kvm\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore CS35L41-specific exports (bsc#1203699)\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).\n- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).\n- kbuild: disable header exports for UML in a straightforward way (git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kbuild: remove the target in signal traps when interrupted (git-fixes).\n- kbuild: rpm-pkg: fix breakage when V=1 is used (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kernfs: fix use-after-free in __kernfs_remove (git-fixes).\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kselftest/arm64: Fix validatation termination record after EXTRA_CONTEXT (git-fixes).\n- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).\n- kselftest/vm: fix tests build with old libc (git-fixes).\n- kselftest: Fix vdso_test_abi return status (git-fixes).\n- kselftest: signal all child processes (git-fixes).\n- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).\n- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).\n- landlock: Add clang-format exceptions (git-fixes).\n- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).\n- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).\n- landlock: Create find_rule() from unmask_layers() (git-fixes).\n- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).\n- landlock: Fix landlock_add_rule(2) documentation (git-fixes).\n- landlock: Fix same-layer rule unions (git-fixes).\n- landlock: Format with clang-format (git-fixes).\n- landlock: Reduce the maximum number of layers to 16 (git-fixes).\n- landlock: Use square brackets around \u0027landlock-ruleset\u0027 (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).\n- livepatch: fix race between fork and KLP transition (bsc#1071995).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- lockd: detect and reject lock arguments that overflow (git-fixes).\n- lockdep: Correct lock_classes index mapping (git-fixes).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).\n- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).\n- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).\n- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).\n- mac802154: Fix LQI recording (git-fixes).\n- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).\n- macsec: Fix invalid error code set (git-fixes).\n- macsec: add missing attribute validation for offload (git-fixes).\n- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).\n- macsec: clear encryption keys from the stack after setting up offload (git-fixes).\n- macsec: delete new rxsc when offload fails (git-fixes).\n- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).\n- macsec: fix detection of RXSCs when toggling offloading (git-fixes).\n- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).\n- macsec: fix secy-\u003en_rx_sc accounting (git-fixes).\n- macsec: limit replay window size with XPN (git-fixes).\n- macvlan: enforce a consistent minimal mtu (git-fixes).\n- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).\n- mailbox: mpfs: account for mbox offsets while sending (git-fixes).\n- mailbox: mpfs: fix handling of the reg property (git-fixes).\n- marvell: octeontx2: build error: unknown type name \u0027u64\u0027 (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: atomisp: prevent integer overflow in sh_css_set_black_frame() (git-fixes).\n- media: cedrus: Fix endless loop in cedrus_h265_skip_bits() (git-fixes).\n- media: cedrus: Set the platform driver data earlier (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).\n- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).\n- media: flexcop-usb: fix endpoint type check (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Correct some definition according specification (git-fixes).\n- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).\n- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).\n- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).\n- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: ipu3-imgu: Fix NULL pointer dereference in active selection access (git-fixes).\n- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).\n- media: mceusb: set timeout to at least timeout provided (git-fixes).\n- media: meson: vdec: add missing clk_disable_unprepare on error in vdec_hevc_start() (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).\n- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).\n- media: rkisp1: Use correct macro for gradient registers (git-fixes).\n- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).\n- media: rkvdec: Disable H.264 error detection (git-fixes).\n- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: uvcvideo: Fix memory leak in uvc_gpio_parse (git-fixes).\n- media: uvcvideo: Use entity get_cur in uvc_ctrl_set (git-fixes).\n- media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args() (git-fixes).\n- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).\n- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).\n- media: venus: dec: Handle the case where find_format fails (git-fixes).\n- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check \u0027interlaced\u0027 (git-fixes).\n- media: vivid: dev-\u003ebitmap_cap wasn\u0027t freed in all cases (git-fixes).\n- media: vivid: s_fbuf: add more sanity checks (git-fixes).\n- media: vivid: set num_in/outputs to 0 if not supported (git-fixes).\n- media: vsp1: Fix offset calculation for plane cropping.\n- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).\n- memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() (git-fixes).\n- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).\n- mfd: fsl-imx25: Fix check for platform_get_irq() errors (git-fixes).\n- mfd: intel-lpss: Add Intel Raptor Lake PCH-S PCI IDs (jsc#PED-634).\n- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: sm501: Add check for platform_driver_register() (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- minix: fix bug when opening a file with O_DIRECT (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- misc: cs35l41: Remove unused pdn variable (bsc#1203699).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).\n- misc: pci_endpoint_test: Aggregate params checking for xfer (git-fixes).\n- misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mlxsw: i2c: Fix initialization error flow (git-fixes).\n- mlxsw: spectrum: Clear PTP configuration after unregistering the netdevice (git-fixes).\n- mlxsw: spectrum_cnt: Reorder counter pools (git-fixes).\n- mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication (git-fixes).\n- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after \u0027mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse\u0027 (git-fixes).\n- mm: Fix PASID use-after-free issue (bsc#1203908).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).\n- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).\n- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).\n- mmc: core: Replace with already defined values for readability (git-fixes).\n- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mmc_test: Fix removal of debugfs file (git-fixes).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).\n- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).\n- mmc: sdhci-esdhc-imx: Propagate ESDHC_FLAG_HS400* only on 8bit bus (git-fixes).\n- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).\n- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).\n- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: sdhci-pci-core: Disable ES for ASUS BIOS on Jasper Lake (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).\n- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).\n- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci_am654: \u0027select\u0027, not \u0027depends\u0027 REGMAP_MMIO (git-fixes).\n- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).\n- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- module: change to print useful messages from elf_validity_check() (git-fixes).\n- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).\n- msft-hv-2570-hv_netvsc-Add-support-for-XDP_REDIRECT.patch: (bsc#1199364).\n- mt76: mt7615: do not update pm stats in case of error (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).\n- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).\n- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).\n- mtd: rawnand: fsl_elbc: Fix none ECC mode (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).\n- mtd: rawnand: intel: Do not re-define NAND_DATA_IFACE_CHECK_ONLY (git-fixes).\n- mtd: rawnand: intel: Read the chip-select line from the correct OF node (git-fixes).\n- mtd: rawnand: intel: Remove undocumented compatible string (git-fixes).\n- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).\n- net/dsa/hirschmann: Add missing of_node_get() in hellcreek_led_setup() (git-fixes).\n- net/ice: fix initializing the bitmap in the switch code (git-fixes).\n- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).\n- net/mlx4_en: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).\n- net/mlx5: Drain fw_reset when removing device (git-fixes).\n- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).\n- net/mlx5e: Disable softirq in mlx5e_activate_rq to avoid race condition (git-fixes).\n- net/mlx5e: Fix enabling sriov while tc nic rules are offloaded (git-fixes).\n- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly disable vlan strip on non-UL reps (git-fixes).\n- net/mlx5e: Remove HW-GRO from reported features (git-fixes).\n- net/mlx5e: Remove WARN_ON when trying to offload an unsupported TLS cipher/version (git-fixes).\n- net/mlx5e: Ring the TX doorbell on DMA errors (git-fixes).\n- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).\n- net/mlx5e: TC, fix decap fallback to uplink when int port not supported (git-fixes).\n- net/mlx5e: Update netdev features after changing XDP state (git-fixes).\n- net/mlx5e: xsk: Account for XSK RQ UMRs when calculating ICOSQ size (git-fixes).\n- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).\n- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).\n- net/smc: Fix an error code in smc_lgr_create() (git-fixes).\n- net/smc: Fix possible access to freed memory in link clear (git-fixes).\n- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).\n- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).\n- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).\n- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).\n- net/smc: Only save the original clcsock callback functions (git-fixes).\n- net/smc: Send directly when TCP_CORK is cleared (git-fixes).\n- net/smc: kABI workarounds for struct smc_link (git-fixes).\n- net/smc: kABI workarounds for struct smc_sock (git-fixes).\n- net/smc: send directly on setting TCP_NODELAY (git-fixes).\n- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: altera: Fix refcount leak in altera_tse_mdio_create (git-fixes).\n- net: asix: fix \u0027can\u0027t send until first packet is send\u0027 issue (git-fixes).\n- net: atlantic: fix aq_vec index out of range error (git-fixes).\n- net: axienet: fix RX ring refill allocation failure handling (git-fixes).\n- net: axienet: reset core on initialization prior to MDIO access (git-fixes).\n- net: bcmgenet: Indicate MAC is in charge of PHY PM (git-fixes).\n- net: bcmgenet: Revert \u0027Use stronger register read/writes to assure ordering\u0027 (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: bcmgenet: hide status block before TX timestamping (git-fixes).\n- net: bgmac: Fix a BUG triggered by wrong bytes_compl (git-fixes).\n- net: bgmac: Fix an erroneous kfree() in bgmac_remove() (git-fixes).\n- net: bgmac: support MDIO described in DT (git-fixes).\n- net: bonding: fix possible NULL deref in rlb code (git-fixes).\n- net: bonding: fix use-after-free after 802.3ad slave unbind (git-fixes).\n- net: chelsio: cxgb4: Avoid potential negative array offset (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: dp83822: disable false carrier interrupt (git-fixes).\n- net: dp83822: disable rx error interrupt (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).\n- net: dsa: bcm_sf2: force pause link settings (git-fixes).\n- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).\n- net: dsa: ksz9477: port mirror sniffing limited to one port (git-fixes).\n- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).\n- net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list (git-fixes).\n- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).\n- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: microchip: ksz9477: fix fdb_dump last invalid entry (git-fixes).\n- net: dsa: microchip: ksz_common: Fix refcount leak bug (git-fixes).\n- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).\n- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).\n- net: dsa: mv88e6060: prevent crash on an unused port (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).\n- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed \u0026 duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix \u0027do not use PHY_DETECT on internal PHY\u0027s\u0027 (git-fixes).\n- net: dsa: mv88e6xxx: use BMSR_ANEGCOMPLETE bit for filling an_complete (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() (git-fixes).\n- net: dsa: sja1105: silent spi_device_id warnings (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: dsa: vitesse-vsc73xx: silent spi_device_id warnings (git-fixes).\n- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register (git-fixes).\n- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).\n- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).\n- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).\n- net: ethernet: ti: am65-cpsw: Fix devlink port register sequence (git-fixes).\n- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).\n- net: ethernet: ti: davinci_mdio: Add workaround for errata i2329 (git-fixes).\n- net: ethernet: ti: davinci_mdio: fix build for mdio bitbang uses (git-fixes).\n- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).\n- net: fix IFF_TX_SKB_NO_LINEAR definition (git-fixes).\n- net: ftgmac100: Hold reference returned by of_get_child_by_name() (git-fixes).\n- net: ftgmac100: access hardware register after clock ready (git-fixes).\n- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: hns3: do not push link state to VF if unalive (git-fixes).\n- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).\n- net: hns3: set port base vlan tbl_sta to false before removing old vlan (git-fixes).\n- net: huawei: hinic: Use devm_kcalloc() instead of devm_kzalloc() (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).\n- net: ipa: do not assume SMEM is page-aligned (git-fixes).\n- net: ipa: get rid of a duplicate initialization (git-fixes).\n- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).\n- net: ipa: record proper RX transaction count (git-fixes).\n- net: ipvtap - add __init/__exit annotations to module init/exit funcs (git-fixes).\n- net: macb: Fix PTP one step sync support (git-fixes).\n- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: mana: Fix race on per-CQ variable napi work_done (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).\n- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).\n- net: mdiobus: fix unbalanced node reference count (git-fixes).\n- net: moxa: get rid of asymmetry in DMA mapping/unmapping (git-fixes).\n- net: moxa: pass pdev instead of ndev to DMA functions (git-fixes).\n- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).\n- net: mscc: ocelot: fix address of SYS_COUNT_TX_AGING counter (git-fixes).\n- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).\n- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).\n- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).\n- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: pcs: xpcs: propagate xpcs_read error to xpcs_get_state_c37_sgmii (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).\n- net: phy: at803x: move page selection fix to config_init (git-fixes).\n- net: phy: dp83822: disable MDI crossover status change interrupt (git-fixes).\n- net: phy: dp83867: Extend RX strap quirk for SGMII mode (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).\n- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).\n- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).\n- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).\n- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).\n- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).\n- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).\n- net: stmmac: fix dma queue left shift overflow issue (git-fixes).\n- net: stmmac: fix leaks in probe (git-fixes).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).\n- net: stmmac: fix pm runtime issue in stmmac_dvr_remove() (git-fixes).\n- net: stmmac: fix unbalanced ptp clock issue in suspend/resume flow (git-fixes).\n- net: stmmac: only enable DMA interrupts when ready (git-fixes).\n- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).\n- net: stmmac: remove redunctant disable xPCS EEE call (git-fixes).\n- net: stmmac: remove unused get_addr() callback (git-fixes).\n- net: stmmac: work around sporadic tx issue on link-up (git-fixes).\n- net: sungem_phy: Add of_node_put() for reference returned by of_get_parent() (git-fixes).\n- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).\n- net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null (git-fixes).\n- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).\n- net: thunderx: Fix the ACPI memory leak (git-fixes).\n- net: usb: Correct PHY handling of smsc95xx (git-fixes).\n- net: usb: Correct reset handling of smsc95xx (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).\n- net: usb: r8152: Add in new Devices that are supported for Mac-Passthru (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net: wwan: iosm: Call mutex_init before locking it (git-fixes).\n- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).\n- net: wwan: iosm: fix kernel test robot reported error (git-fixes).\n- net: wwan: iosm: remove pointless null check (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- netdevsim: fib: Fix reference count leak on route deletion failure (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: fdp: Fix potential memory leak in fdp_nci_send() (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nfp: ethtool: fix the display error of `ethtool -m DEVNAME` (git-fixes).\n- nfsd: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).\n- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).\n- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).\n- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).\n- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).\n- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).\n- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).\n- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau/svm: Fix to migrate all requested pages (git-fixes).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-auth: retry command if DNR bit is not set (bsc#1201675).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: consider also host_iface when checking ip options (bsc#1199670).\n- nvme: do not print verbose errors for internal passthrough requests (bsc#1202187).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvme: implement In-Band authentication (jsc#SLE-20183).\n- nvme: kabi fixes for in-band authentication (bsc#1199086).\n- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).\n- nvmet-auth: expire authentication sessions (jsc#SLE-20183).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Apply tx nibble fixup always (git-fixes).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix key checking for source mac (git-fixes).\n- octeontx2-af: Fix mcam entry resource leak (git-fixes).\n- octeontx2-af: Fix spelling mistake \u0027Makesure\u0027 -\u003e \u0027Make sure\u0027 (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: suppress external profile loading warning (git-fixes).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix NIX_AF_TL3_TL2X_LINKX_CFG register configuration (git-fixes).\n- octeontx2-pf: Fix UDP/TCP src and dst port tc filters (git-fixes).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Fix egress ratelimit configuration (git-fixes).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- openvswitch: add nf_ct_is_confirmed check before assigning the helper (git-fixes).\n- openvswitch: always update flow key after nat (git-fixes).\n- openvswitch: switch from WARN to pr_warn (git-fixes).\n- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).\n- overflow.h: restore __ab_c_size (git-fixes).\n- overflow: Implement size_t saturating arithmetic helpers (jsc#PED-1211).\n- pNFS/flexfiles: Report RDMA connection errors to the server (git-fixes).\n- padata: Fix list iterator in padata_do_serial() (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1152489)\n- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)\n- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)\n- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: amlogic: phy-meson-axg-mipi-pcie-analog: Hold reference returned by of_get_parent() (git-fixes).\n- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).\n- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: Ingenic: JZ4755 bug fixes (git-fixes).\n- pinctrl: alderlake: Add Intel Alder Lake-N pin controller support (jsc#PED-676).\n- pinctrl: alderlake: Add Raptor Lake-S ACPI ID (jsc#PED-634).\n- pinctrl: alderlake: Fix register offsets for ADL-N variant (jsc#PED-676).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).\n- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).\n- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).\n- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).\n- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).\n- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: intel: Save and restore pins in \u0027direct IRQ\u0027 mode (git-fixes).\n- pinctrl: microchip-sgpio: Correct the fwnode_irq_get() return value check (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).\n- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).\n- pinctrl: single: Fix potential division by zero (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec: Notify the PM of wake events during resume (git-fixes).\n- platform/chrome: cros_ec_proto: Update version on GET_NEXT_EVENT failure (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/chrome: cros_ec_typec: Correct alt mode index (git-fixes).\n- platform/chrome: fix double-free in chromeos_laptop_prepare() (git-fixes).\n- platform/chrome: fix memory corruption in ioctl (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).\n- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).\n- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).\n- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).\n- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).\n- platform/x86: asus-wmi: Document the dgpu_disable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the egpu_enable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the panel_od sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).\n- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).\n- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).\n- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).\n- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).\n- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).\n- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).\n- plip: avoid rcu debug splat (git-fixes).\n- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).\n- powerpc-pseries-mobility-set-NMI-watchdog-factor-dur.patch.\n- powerpc-watchdog-introduce-a-NMI-watchdog-s-factor.patch.\n- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).\n- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).\n- powerpc/64: pcpu setup avoid reading mmu_linear_psize on 64e or radix (bsc#1204413 ltc#200176).\n- powerpc/64s: Fix build failure when CONFIG_PPC_64S_HASH_MMU is not set (bsc#1204413 ltc#200176).\n- powerpc/64s: Make flush_and_reload_slb a no-op when radix is enabled (bsc#1204413 ltc#200176).\n- powerpc/64s: Make hash MMU support configurable (bsc#1204413 ltc#200176).\n- powerpc/64s: Move and rename do_bad_slb_fault as it is not hash specific (bsc#1204413 ltc#200176).\n- powerpc/64s: Move hash MMU support code under CONFIG_PPC_64S_HASH_MMU (bsc#1204413 ltc#200176).\n- powerpc/64s: Rename hash_hugetlbpage.c to hugetlbpage.c (bsc#1204413 ltc#200176).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).\n- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).\n- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries/vas: Add VAS IRQ primary handler (bsc#1204413 ltc#200176).\n- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).\n- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).\n- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Stop selecting PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176).\n- powerpc/pseries: lparcfg do not include slb_size line in radix mode (bsc#1204413 ltc#200176).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: Ignore DSI error caused by the copy/paste instruction (bsc#1204413 ltc#200176).\n- powerpc: Rename PPC_NATIVE to PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176). Update config files.\n- powerpc: make memremap_compat_align 64s-only (bsc#1204413 ltc#200176).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).\n- printk: use atomic updates for klogd work (bsc#1204934).\n- printk: wake waiters for safe and NMI contexts (bsc#1204934).\n- proc: avoid integer type confusion in get_proc_long (git-fixes).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- proc: proc_skip_spaces() shouldn\u0027t think it is working on C strings (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: core: Prevent integer underflow (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: imx_rproc: Simplify some error message (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- restore m_can_lec_type (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (bsc#1204705).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- rose: Fix NULL pointer dereference in rose_send_frame() (git-fixes).\n- rose: check NULL rose_loopback_neigh-\u003eloopback (git-fixes).\n- rpm/check-for-config-changes: add TOOLCHAIN_HAS_* to IGNORED_CONFIGS_RE This new form was added in commit b8c86872d1dc (riscv: fix detection of toolchain Zicbom support).\n- rpm/check-for-config-changes: loosen pattern for AS_HAS_* This is needed to handle CONFIG_AS_HAS_NON_CONST_LEB128.\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks \u0027find -xtype l\u0027 will report them, so use that to make the search a bit faster (without using shell).\n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).\n- rtmutex: Add acquire semantics for rtmutex lock acquisition slow path (bnc#1203829).\n- s390/boot: add secure boot trailer (bsc#1205257 LTC#200451).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/smp: enforce lowcore protection on CPU restart (git-fixes).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).\n- s390: fix nospec table alignments (git-fixes).\n- samples/landlock: Add clang-format exceptions (git-fixes).\n- samples/landlock: Fix path_list memory leak (git-fixes).\n- samples/landlock: Format with clang-format (git-fixes).\n- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).\n- sbitmap: fix possible io hung due to lost wakeup (git-fixes).\n- sched-core-Do-not-requeue-task-on-CPU-excluded-from-cpus_mask.patch\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word \u0027 *\u0027 (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq-\u003euclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).\n- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).\n- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).\n- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scripts/gdb: change kernel config dumping method (git-fixes).\n- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).\n- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).\n- scsi: Revert \u0027scsi: qla2xxx: Fix disk failure to rediscover\u0027 (git-fixes).\n- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix spelling mistake \u0027unsolicted\u0027 -\u003e \u0027unsolicited\u0027 (bsc#1204957).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939). Dropped: patches.suse/lpfc-decouple-port_template-and-vport_template.patch\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Set sli4_param\u0027s cmf option to zero when CMF is turned off (bsc#1204957).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: megaraid: Clear READ queue map\u0027s nr_queues (git-fixes).\n- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).\n- scsi: mpi3mr: Schedule IRQ kthreads only on non-RT kernels (bnc#1204498).\n- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: qedf: Populate sysfs attributes for vport (git-fixes).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).\n- scsi: qla2xxx: Define static symbols (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).\n- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).\n- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).\n- scsi: qla2xxx: Fix imbalance vha-\u003evref_count (bsc#1201958).\n- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).\n- scsi: qla2xxx: Fix spelling mistake \u0027definiton\u0027 -\u003e \u0027definition\u0027 (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update manufacturer details (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).\n- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).\n- scsi: scsi_transport_fc: Use %u for dev_loss_tmo (bsc#1202914).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix typo in comment (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: remove an extraneous \u0027to\u0027 in a comment (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: ufs: ufs-pci: Add support for Intel ADL (jsc#PED-707).\n- scsi: ufs: ufs-pci: Add support for Intel MTL (jsc#PED-732).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).\n- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).\n- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).\n- selftest/vm: verify mmap addr in mremap_test (git-fixes).\n- selftest/vm: verify remap destination address in mremap_test (git-fixes).\n- selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle (git-fixes).\n- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).\n- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).\n- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).\n- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).\n- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).\n- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).\n- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).\n- selftests/landlock: Add clang-format exceptions (git-fixes).\n- selftests/landlock: Add tests for O_PATH (git-fixes).\n- selftests/landlock: Add tests for unknown access rights (git-fixes).\n- selftests/landlock: Extend access right tests to directories (git-fixes).\n- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).\n- selftests/landlock: Format with clang-format (git-fixes).\n- selftests/landlock: Fully test file rename with \u0027remove\u0027 access (git-fixes).\n- selftests/landlock: Make tests build with old libc (git-fixes).\n- selftests/landlock: Normalize array assignment (git-fixes).\n- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).\n- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).\n- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).\n- selftests/memfd: remove unused variable (git-fixes).\n- selftests/net: pass ipv6_args to udpgso_bench\u0027s IPv6 TCP test (git-fixes).\n- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).\n- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).\n- selftests/net: timestamping: Fix bind_phc check (git-fixes).\n- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).\n- selftests/pidfd_test: Remove the erroneous \u0027,\u0027 (git-fixes).\n- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).\n- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).\n- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).\n- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).\n- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).\n- selftests/rseq: Fix ppc32 missing instruction selection \u0027u\u0027 and \u0027x\u0027 for load/store (git-fixes).\n- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).\n- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).\n- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).\n- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).\n- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).\n- selftests/rseq: Introduce thread pointer getters (git-fixes).\n- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).\n- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).\n- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).\n- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).\n- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).\n- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).\n- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).\n- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).\n- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).\n- selftests/sgx: Treat CC as one argument (git-fixes).\n- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).\n- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).\n- selftests/x86: Add validity check and allow field splitting (git-fixes).\n- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).\n- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).\n- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).\n- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).\n- selftests: Fix IPv6 address bind tests (git-fixes).\n- selftests: Fix raw socket bind tests with VRF (git-fixes).\n- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).\n- selftests: add ping test with ping_group_range tuned (git-fixes).\n- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).\n- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).\n- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).\n- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).\n- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).\n- selftests: forwarding: Fix failing tests with old libnet (git-fixes).\n- selftests: forwarding: add shebang for sch_red.sh (git-fixes).\n- selftests: forwarding: fix error message in learning_test (git-fixes).\n- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- selftests: gpio: fix gpio compiling error (git-fixes).\n- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).\n- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).\n- selftests: mlxsw: resource_scale: Fix return value (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).\n- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).\n- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).\n- selftests: mptcp: fix diag instability (git-fixes).\n- selftests: mptcp: fix ipv6 routing setup (git-fixes).\n- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).\n- selftests: mptcp: make sendfile selftest work (git-fixes).\n- selftests: mptcp: more stable diag tests (git-fixes).\n- selftests: mptcp: more stable simult_flows tests (git-fixes).\n- selftests: net: Correct case name (git-fixes).\n- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).\n- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).\n- selftests: net: tls: remove unused variable and code (git-fixes).\n- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).\n- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).\n- selftests: netfilter: Fix nft_fib.sh for all.rp_filter=1 (git-fixes).\n- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).\n- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).\n- selftests: netfilter: disable rp_filter on router (git-fixes).\n- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).\n- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).\n- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).\n- selftests: openat2: Add missing dependency in Makefile (git-fixes).\n- selftests: openat2: Print also errno in failure messages (git-fixes).\n- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).\n- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).\n- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).\n- selftests: rtc: Increase test timeout so that all tests run (git-fixes).\n- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).\n- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).\n- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).\n- selftests: vm: fix clang build error multiple output files (git-fixes).\n- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: allow FIOCLEX and FIONCLEX with policy capability (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use \u0027grep -E\u0027 instead of \u0027egrep\u0027 (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on -\u003eset_termios() (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: Fix restoring termios speed after suspend (git-fixes).\n- serial: 8250: Flush DMA Rx on RLSI (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: atmel: remove redundant assignment in rs485_config (git-fixes).\n- serial: core: move RS485 configuration tasks from drivers into core (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: fsl_lpuart: Reset prior to registration (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- sfc: disable softirqs for ptp TX (git-fixes).\n- sfc: fix kernel panic when creating VF (git-fixes).\n- sfc: fix use after free when disabling sriov (git-fixes).\n- signal: break out of wait loops on kthread_stop() (bsc#1204926).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: qcom-ngd: cleanup in probe error path (git-fixes).\n- slimbus: qcom-ngd: use correct error in message of pdr_add_lookup() failure (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1193629).\n- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).\n- smb3: add dynamic trace points for tree disconnect (bsc#1193629).\n- smb3: add trace point for SMB2_set_eof (bsc#1193629).\n- smb3: allow deferred close timeout to be configurable (bsc#1193629).\n- smb3: check xattr value length earlier (bsc#1193629).\n- smb3: clarify multichannel warning (bsc#1193629).\n- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).\n- smb3: fix empty netname context on secondary channels (bsc#1193629).\n- smb3: fix oops in calculating shash_setkey (bsc#1193629).\n- smb3: fix temporary data corruption in collapse range (bsc#1193629).\n- smb3: fix temporary data corruption in insert range (bsc#1193629).\n- smb3: improve SMB3 change notification support (bsc#1193629).\n- smb3: interface count displayed incorrectly (bsc#1193629).\n- smb3: missing inode locks in punch hole (bsc#1193629).\n- smb3: missing inode locks in zero range (bsc#1193629).\n- smb3: must initialize two ACL struct fields to zero (bsc#1193629).\n- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).\n- smb3: rename encryption/decryption TFMs (bsc#1193629).\n- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).\n- smb3: use netname when available on secondary channels (bsc#1193629).\n- smb3: workaround negprot bug in some Samba servers (bsc#1193629).\n- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).\n- soc/tegra: fuse: Drop Kconfig dependency on TEGRA20_APB_DMA (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: qcom: smem_state: Add refcounting for the \u0027state-\u003eof_node\u0027 (git-fixes).\n- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Fix probe function ordering issues (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: cadence: Do not overwrite msg-\u003ebuf during write commands (git-fixes).\n- soundwire: intel: Initialize clock stop timeout (bsc#1205507).\n- soundwire: intel: fix error handling on dai registration issues (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: check for outanding writes before doing a read (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- soundwire: qcom: reinit broadcast completion (git-fixes).\n- speakup: fix a segfault caused by switching consoles (git-fixes).\n- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).\n- spi: Add API to count spi acpi resources (bsc#1203699).\n- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).\n- spi: Ensure that sg_table won\u0027t be used after being freed (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: Return deferred probe error when controller isn\u0027t yet available (bsc#1203699).\n- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).\n- spi: dt-bindings: cadence: add missing \u0027required\u0027 (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing \u0027required\u0027 (git-fixes).\n- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).\n- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).\n- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).\n- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).\n- spi: pxa2xx: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- spi: pxa2xx: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).\n- spi: s3c64xx: Fix large transfers with DMA (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spi: tegra210-quad: Fix duplicate resource error (git-fixes).\n- spmi: pmic-arb: correct duplicate APID to PPID mapping logic (git-fixes).\n- spmi: pmic-arb: do not ack and clear peripheral interrupts in cleanup_irq (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).\n- staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() (git-fixes).\n- staging: vt6655: fix potential memory leak (git-fixes).\n- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).\n- stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove() (git-fixes).\n- stmmac: intel: Fix an error handling path in intel_eth_pci_probe() (git-fixes).\n- struct ehci_hcd: hide new element going into a hole (git-fixes).\n- struct xhci_hcd: restore member now dynamically allocated (git-fixes).\n- sunrpc: fix expiry of auth creds (git-fixes).\n- supported.conf: Add cs_dsp firmware module (bsc#1203699)\n- supported.conf: Add drivers/virt/coco/sevguest/sevguest\n- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and \t\tchanged all octeontx2 modules as supported (jsc#SLE-24682)\n- supported.conf: mark drivers/nvme/common as supported (jsc#SLE-20183)\n- supported.conf: mark lib/objagg supported as dependency of mlxsw\n- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)\n- supported.conf: mark spi-pxa2xx-platform as supported (bsc#1203699) It\u0027s required for the sound on recent Intel machines\n- tee: optee: do not check memref size on return from Secure World (git-fixes).\n- tee: tee_get_drvdata(): fix description of return value (git-fixes).\n- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).\n- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).\n- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).\n- tests: fix idmapped mount_setattr test (git-fixes).\n- thermal/drivers/qcom/tsens-v0_1: Fix MSM8939 fourth sensor hw_id (git-fixes).\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: cpufreq_cooling: Check the policy first in cpufreq_cooling_register() (git-fixes).\n- thermal: int340x: Mode setting with new OS handshake (jsc#PED-678).\n- thermal: int340x: Update OS policy capability handshake (jsc#PED-678).\n- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).\n- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).\n- thunderbolt: Add back Intel Falcon Ridge end-to-end flow control workaround (git-fixes).\n- thunderbolt: Add missing device ID to tb_switch_is_alpine_ridge() (git-fixes).\n- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).\n- thunderbolt: Add support for Intel Raptor Lake (jsc#PED-634).\n- thunderbolt: Disable LTTPR on Intel Titan Ridge (git-fixes).\n- thunderbolt: Explicitly enable lane adapter hotplug events at startup (git-fixes).\n- thunderbolt: Explicitly reset plug events delay back to USB4 spec value (git-fixes).\n- thunderbolt: Fix buffer allocation of devices with no DisplayPort adapters (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- timers: implement usleep_idle_range() (git-fixes).\n- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).\n- tools/nolibc: fix incorrect truncation of exit code (git-fixes).\n- tools/nolibc: i386: fix initial stack alignment (git-fixes).\n- tools/nolibc: x86-64: Fix startup code bug (git-fixes).\n- tools/testing/scatterlist: add missing defines (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tools: hv: Remove an extraneous \u0027the\u0027 (git-fixes).\n- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).\n- tools: iio: iio_generic_buffer: Fix read size (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/osnoise: Fix duration type (git-fixes).\n- tracing/osnoise: Fix possible recursive locking in stop_per_cpu_kthreads (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Add \u0027(fault)\u0027 name injection to kernel probes (git-fixes).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Add tracing_reset_all_online_cpus_unlocked() function (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).\n- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).\n- tracing: Fix reading strings from synthetic events (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: Free buffers when a used dynamic event is removed (git-fixes).\n- tracing: Have filter accept \u0027common_cpu\u0027 to be consistent (git-fixes).\n- tracing: Move duplicate code of trace_kprobe/eprobe.c into header (git-fixes).\n- tracing: Replace deprecated CPU-hotplug functions (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tracing: kprobe: Fix kprobe event gen test module on exit (git-fixes).\n- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Make gen test module work in arm and riscv (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).\n- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: Save dlci address open status when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix decoupled mux resource (git-fixes).\n- tty: n_gsm: fix encoding of command/response bit (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix frame reception handling (git-fixes).\n- tty: n_gsm: fix incorrect UA handling (git-fixes).\n- tty: n_gsm: fix insufficient txframe size (git-fixes).\n- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).\n- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).\n- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).\n- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).\n- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix reset fifo race condition (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix restart handling via CLD command (git-fixes).\n- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).\n- tty: n_gsm: fix software flow control handling (git-fixes).\n- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong DLCI release order (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).\n- tty: n_gsm: fix wrong command retry handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).\n- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- tty: xilinx_uartps: Fix the ignore_status (git-fixes).\n- tun: avoid double free in tun_free_netdev (git-fixes).\n- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).\n- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).\n- uaccess: fix type mismatch warnings from access_ok() (git-fixes).\n- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).\n- uas: ignore UAS for Thinkplus chips (git-fixes).\n- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).\n- ucounts: Fix rlimit max values check (git-fixes).\n- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).\n- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).\n- ucounts: In set_cred_ucounts assume new-\u003eucounts is non-NULL (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- udmabuf: Set ubuf-\u003esg = NULL if the creation of sg table fails (git-fixes).\n- udmabuf: add back sanity check (git-fixes).\n- units: Add SI metric prefix definitions (git-fixes).\n- units: add the HZ macros (git-fixes).\n- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).\n- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- usb.h: struct usb_device: hide new member (git-fixes).\n- usb/hcd: Fix dma_map_sg error check (git-fixes).\n- usb: Drop commas after SoC match table sentinels (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: bdc: change state when port disconnected (git-fixes).\n- usb: cdc-wdm: Use skb_put_data() instead of skb_put/memcpy pair (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).\n- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).\n- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: common: debug: Check non-standard control requests (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: core: Enable GUCTL1 bit 10 for fixing termination error after resume bug (git-fixes).\n- usb: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).\n- usb: dwc3: disable USB core PHY management (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).\n- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).\n- usb: dwc3: gadget: Refactor pullup() (git-fixes).\n- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).\n- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).\n- usb: dwc3: gadget: conditionally remove requests (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: ehci: Fix a function name in comments (git-fixes).\n- usb: gadget: bdc: fix typo in comment (git-fixes).\n- usb: gadget: f_fs: stricter integer overflow checks (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci-plat: suspend and resume clocks (git-fixes).\n- usb: host: xhci-plat: suspend/resume clks for brcm (git-fixes).\n- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).\n- usb: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use ffs() in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: hub: avoid warm port reset during USB3 disconnect (git-fixes).\n- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).\n- usb: mon: make mmapped memory read only (git-fixes).\n- usb: mtu3: fix failed runtime suspend in host only mode (git-fixes).\n- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: smsc: use eth_hw_addr_set() (git-fixes).\n- usb: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).\n- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: tcpm: fix typo in comment (git-fixes).\n- usb: typec: tipd: Add an additional overflow check (git-fixes).\n- usb: typec: tipd: Do not read/write more bytes than required (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: typec: ucsi: Remove incorrect warning (git-fixes).\n- usb: xhci-mtk: check boundary before check tt (git-fixes).\n- usb: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).\n- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).\n- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: Run unregister_netdev() before unbind() again (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Do not reset PHY behind PHY driver\u0027s back (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio/type1: Unpin zero pages (git-fixes).\n- vfio: Clear the caps-\u003ebuf to NULL after free (git-fixes).\n- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).\n- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: i740fb: Error out if \u0027pixclock\u0027 equals zero (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).\n- virt: vbox: convert to use dev_groups (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: correctly report encapsulated LRO packet (git-fixes).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).\n- vsock/virtio: enable VQs early on probe (git-fixes).\n- vsock/virtio: initialize vdev-\u003epriv before using VQs (git-fixes).\n- vsock/virtio: read the negotiated features before using VQs (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vsock: fix possible infinite sleep in vsock_connectible_wait_data() (git-fixes).\n- vsock: remove the unused \u0027wait\u0027 in vsock_connectible_recvmsg() (git-fixes).\n- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- watch-queue: remove spurious double semicolon (git-fixes).\n- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).\n- watch_queue: Fix missing rcu annotation (git-fixes).\n- watchdog-export-lockup_detector_reconfigure.patch.\n- watchdog/hpwdt: Include nmi.h only if CONFIG_HPWDT_NMI_DECODING (git-fixes).\n- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- watchqueue: make sure to serialize \u0027wqueue-\u003edefunct\u0027 properly (git-fixes).\n- wifi: airo: do not assign -1 to unsigned char (git-fixes).\n- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).\n- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).\n- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).\n- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).\n- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).\n- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).\n- wifi: cfg80211/mac80211: reject bad MBSSID elements (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix ieee80211_data_to_8023_exthdr handling of small packets (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).\n- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).\n- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).\n- wifi: mac80211: fix decap offload for stations on AP_VLAN interfaces (git-fixes).\n- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).\n- wifi: mac80211: fix probe req HE capabilities access (git-fixes).\n- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).\n- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).\n- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).\n- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).\n- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).\n- wifi: mt76: mt7921: reset msta-\u003eairtime_ac while clearing up hw value (git-fixes).\n- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).\n- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).\n- wifi: rt2x00: set SoC wmac clock register (git-fixes).\n- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).\n- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).\n- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).\n- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).\n- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).\n- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).\n- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).\n- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).\n- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wext: use flex array destination for memcpy() (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).\n- wifi: wilc1000: validate number of channels (git-fixes).\n- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).\n- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).\n- wireless: Remove redundant \u0027flush_workqueue()\u0027 calls (bsc#1202131).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).\n- wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() (git-fixes).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).\n- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Do not propagate uninitialized boot_params-\u003ecc_blob_address (bsc#1204970).\n- x86/boot: Fix the setup data types max limit (bsc#1204970).\n- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add identity mappings for setup_data entries (bsc#1204970).\n- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/entry: Work around Clang __bdos() bug (git-fixes).\n- x86/extable: Extend extable functionality (git-fixes).\n- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).\n- x86/futex: Remove .fixup usage (git-fixes).\n- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).\n- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).\n- x86/hyperv: Fix \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: Update \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).\n- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).\n- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).\n- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).\n- x86/sev: Annotate stack change in the #VC handler (bsc#1204970).\n- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Do not use cc_platform_has() for early SEV-SNP calls (bsc#1204970).\n- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Remove duplicated assignment to variable info (bsc#1204970).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen-blkback: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkback: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkback: fix persistent grants negotiation (git-fixes).\n- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkfront: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).\n- xen-blkfront: Handle NULL gendisk (git-fixes).\n- xen-netback: only remove \u0027hotplug-status\u0027 when the vif is actually destroyed (git-fixes).\n- xen/gntdev: Accommodate VMA splitting (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).\n- xfs: fix perag reference leak on iteration race with growfs (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).\n- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).\n- xfs: revert \u0027xfs: actually bump warning counts when we send warnings\u0027 (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n- xhci-pci: Set runtime PM as default policy on all xHC 1.2 or later devices (git-fixes).\n- xhci: Add quirk to reset host back to default state at shutdown (git-fixes).\n- xhci: Allocate separate command structures for each LPM command (git-fixes).\n- xhci: Do not show warning for reinit on known broken suspend (git-fixes).\n- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).\n- xhci: Set HCD flag to defer primary roothub registration (git-fixes).\n- xhci: dbc: Fix memory leak in xhci_alloc_dbc() (git-fixes).\n- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).\n- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).\n- xhci: dbc: refactor xhci_dbc_init() (git-fixes).\n- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).\n- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).\n- zonefs: Clear inode information flags on inode creation (git-fixes).\n- zonefs: Fix management of open zones (git-fixes).\n- zonefs: add MODULE_ALIAS_FS (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4617,SUSE-SLE-Micro-5.3-2022-4617,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4617,SUSE-SLE-Module-RT-15-SP4-2022-4617,openSUSE-Leap-Micro-5.3-2022-4617,openSUSE-SLE-15.4-2022-4617",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4617-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4617-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224617-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4617-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "self",
"summary": "SUSE Bug 1023051",
"url": "https://bugzilla.suse.com/1023051"
},
{
"category": "self",
"summary": "SUSE Bug 1032323",
"url": "https://bugzilla.suse.com/1032323"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164051",
"url": "https://bugzilla.suse.com/1164051"
},
{
"category": "self",
"summary": "SUSE Bug 1177471",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1188238",
"url": "https://bugzilla.suse.com/1188238"
},
{
"category": "self",
"summary": "SUSE Bug 1189297",
"url": "https://bugzilla.suse.com/1189297"
},
{
"category": "self",
"summary": "SUSE Bug 1189999",
"url": "https://bugzilla.suse.com/1189999"
},
{
"category": "self",
"summary": "SUSE Bug 1190256",
"url": "https://bugzilla.suse.com/1190256"
},
{
"category": "self",
"summary": "SUSE Bug 1190497",
"url": "https://bugzilla.suse.com/1190497"
},
{
"category": "self",
"summary": "SUSE Bug 1190969",
"url": "https://bugzilla.suse.com/1190969"
},
{
"category": "self",
"summary": "SUSE Bug 1192968",
"url": "https://bugzilla.suse.com/1192968"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194023",
"url": "https://bugzilla.suse.com/1194023"
},
{
"category": "self",
"summary": "SUSE Bug 1194592",
"url": "https://bugzilla.suse.com/1194592"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1194904",
"url": "https://bugzilla.suse.com/1194904"
},
{
"category": "self",
"summary": "SUSE Bug 1195480",
"url": "https://bugzilla.suse.com/1195480"
},
{
"category": "self",
"summary": "SUSE Bug 1195917",
"url": "https://bugzilla.suse.com/1195917"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1196444",
"url": "https://bugzilla.suse.com/1196444"
},
{
"category": "self",
"summary": "SUSE Bug 1196616",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "self",
"summary": "SUSE Bug 1196632",
"url": "https://bugzilla.suse.com/1196632"
},
{
"category": "self",
"summary": "SUSE Bug 1196867",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "self",
"summary": "SUSE Bug 1196869",
"url": "https://bugzilla.suse.com/1196869"
},
{
"category": "self",
"summary": "SUSE Bug 1197158",
"url": "https://bugzilla.suse.com/1197158"
},
{
"category": "self",
"summary": "SUSE Bug 1197391",
"url": "https://bugzilla.suse.com/1197391"
},
{
"category": "self",
"summary": "SUSE Bug 1197659",
"url": "https://bugzilla.suse.com/1197659"
},
{
"category": "self",
"summary": "SUSE Bug 1197755",
"url": "https://bugzilla.suse.com/1197755"
},
{
"category": "self",
"summary": "SUSE Bug 1197756",
"url": "https://bugzilla.suse.com/1197756"
},
{
"category": "self",
"summary": "SUSE Bug 1197757",
"url": "https://bugzilla.suse.com/1197757"
},
{
"category": "self",
"summary": "SUSE Bug 1197763",
"url": "https://bugzilla.suse.com/1197763"
},
{
"category": "self",
"summary": "SUSE Bug 1198189",
"url": "https://bugzilla.suse.com/1198189"
},
{
"category": "self",
"summary": "SUSE Bug 1198410",
"url": "https://bugzilla.suse.com/1198410"
},
{
"category": "self",
"summary": "SUSE Bug 1198577",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "self",
"summary": "SUSE Bug 1198702",
"url": "https://bugzilla.suse.com/1198702"
},
{
"category": "self",
"summary": "SUSE Bug 1198971",
"url": "https://bugzilla.suse.com/1198971"
},
{
"category": "self",
"summary": "SUSE Bug 1199086",
"url": "https://bugzilla.suse.com/1199086"
},
{
"category": "self",
"summary": "SUSE Bug 1199364",
"url": "https://bugzilla.suse.com/1199364"
},
{
"category": "self",
"summary": "SUSE Bug 1199515",
"url": "https://bugzilla.suse.com/1199515"
},
{
"category": "self",
"summary": "SUSE Bug 1199670",
"url": "https://bugzilla.suse.com/1199670"
},
{
"category": "self",
"summary": "SUSE Bug 1199904",
"url": "https://bugzilla.suse.com/1199904"
},
{
"category": "self",
"summary": "SUSE Bug 1200015",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "self",
"summary": "SUSE Bug 1200058",
"url": "https://bugzilla.suse.com/1200058"
},
{
"category": "self",
"summary": "SUSE Bug 1200268",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "self",
"summary": "SUSE Bug 1200288",
"url": "https://bugzilla.suse.com/1200288"
},
{
"category": "self",
"summary": "SUSE Bug 1200301",
"url": "https://bugzilla.suse.com/1200301"
},
{
"category": "self",
"summary": "SUSE Bug 1200313",
"url": "https://bugzilla.suse.com/1200313"
},
{
"category": "self",
"summary": "SUSE Bug 1200431",
"url": "https://bugzilla.suse.com/1200431"
},
{
"category": "self",
"summary": "SUSE Bug 1200465",
"url": "https://bugzilla.suse.com/1200465"
},
{
"category": "self",
"summary": "SUSE Bug 1200494",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "self",
"summary": "SUSE Bug 1200544",
"url": "https://bugzilla.suse.com/1200544"
},
{
"category": "self",
"summary": "SUSE Bug 1200567",
"url": "https://bugzilla.suse.com/1200567"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200644",
"url": "https://bugzilla.suse.com/1200644"
},
{
"category": "self",
"summary": "SUSE Bug 1200651",
"url": "https://bugzilla.suse.com/1200651"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200788",
"url": "https://bugzilla.suse.com/1200788"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1200868",
"url": "https://bugzilla.suse.com/1200868"
},
{
"category": "self",
"summary": "SUSE Bug 1200869",
"url": "https://bugzilla.suse.com/1200869"
},
{
"category": "self",
"summary": "SUSE Bug 1200870",
"url": "https://bugzilla.suse.com/1200870"
},
{
"category": "self",
"summary": "SUSE Bug 1200871",
"url": "https://bugzilla.suse.com/1200871"
},
{
"category": "self",
"summary": "SUSE Bug 1200872",
"url": "https://bugzilla.suse.com/1200872"
},
{
"category": "self",
"summary": "SUSE Bug 1200873",
"url": "https://bugzilla.suse.com/1200873"
},
{
"category": "self",
"summary": "SUSE Bug 1201019",
"url": "https://bugzilla.suse.com/1201019"
},
{
"category": "self",
"summary": "SUSE Bug 1201308",
"url": "https://bugzilla.suse.com/1201308"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1201361",
"url": "https://bugzilla.suse.com/1201361"
},
{
"category": "self",
"summary": "SUSE Bug 1201427",
"url": "https://bugzilla.suse.com/1201427"
},
{
"category": "self",
"summary": "SUSE Bug 1201442",
"url": "https://bugzilla.suse.com/1201442"
},
{
"category": "self",
"summary": "SUSE Bug 1201455",
"url": "https://bugzilla.suse.com/1201455"
},
{
"category": "self",
"summary": "SUSE Bug 1201489",
"url": "https://bugzilla.suse.com/1201489"
},
{
"category": "self",
"summary": "SUSE Bug 1201610",
"url": "https://bugzilla.suse.com/1201610"
},
{
"category": "self",
"summary": "SUSE Bug 1201675",
"url": "https://bugzilla.suse.com/1201675"
},
{
"category": "self",
"summary": "SUSE Bug 1201725",
"url": "https://bugzilla.suse.com/1201725"
},
{
"category": "self",
"summary": "SUSE Bug 1201726",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "self",
"summary": "SUSE Bug 1201768",
"url": "https://bugzilla.suse.com/1201768"
},
{
"category": "self",
"summary": "SUSE Bug 1201865",
"url": "https://bugzilla.suse.com/1201865"
},
{
"category": "self",
"summary": "SUSE Bug 1201940",
"url": "https://bugzilla.suse.com/1201940"
},
{
"category": "self",
"summary": "SUSE Bug 1201941",
"url": "https://bugzilla.suse.com/1201941"
},
{
"category": "self",
"summary": "SUSE Bug 1201948",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "self",
"summary": "SUSE Bug 1201954",
"url": "https://bugzilla.suse.com/1201954"
},
{
"category": "self",
"summary": "SUSE Bug 1201956",
"url": "https://bugzilla.suse.com/1201956"
},
{
"category": "self",
"summary": "SUSE Bug 1201958",
"url": "https://bugzilla.suse.com/1201958"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202096",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202113",
"url": "https://bugzilla.suse.com/1202113"
},
{
"category": "self",
"summary": "SUSE Bug 1202131",
"url": "https://bugzilla.suse.com/1202131"
},
{
"category": "self",
"summary": "SUSE Bug 1202154",
"url": "https://bugzilla.suse.com/1202154"
},
{
"category": "self",
"summary": "SUSE Bug 1202187",
"url": "https://bugzilla.suse.com/1202187"
},
{
"category": "self",
"summary": "SUSE Bug 1202262",
"url": "https://bugzilla.suse.com/1202262"
},
{
"category": "self",
"summary": "SUSE Bug 1202265",
"url": "https://bugzilla.suse.com/1202265"
},
{
"category": "self",
"summary": "SUSE Bug 1202312",
"url": "https://bugzilla.suse.com/1202312"
},
{
"category": "self",
"summary": "SUSE Bug 1202341",
"url": "https://bugzilla.suse.com/1202341"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1202347",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202393",
"url": "https://bugzilla.suse.com/1202393"
},
{
"category": "self",
"summary": "SUSE Bug 1202447",
"url": "https://bugzilla.suse.com/1202447"
},
{
"category": "self",
"summary": "SUSE Bug 1202471",
"url": "https://bugzilla.suse.com/1202471"
},
{
"category": "self",
"summary": "SUSE Bug 1202558",
"url": "https://bugzilla.suse.com/1202558"
},
{
"category": "self",
"summary": "SUSE Bug 1202623",
"url": "https://bugzilla.suse.com/1202623"
},
{
"category": "self",
"summary": "SUSE Bug 1202636",
"url": "https://bugzilla.suse.com/1202636"
},
{
"category": "self",
"summary": "SUSE Bug 1202672",
"url": "https://bugzilla.suse.com/1202672"
},
{
"category": "self",
"summary": "SUSE Bug 1202681",
"url": "https://bugzilla.suse.com/1202681"
},
{
"category": "self",
"summary": "SUSE Bug 1202685",
"url": "https://bugzilla.suse.com/1202685"
},
{
"category": "self",
"summary": "SUSE Bug 1202686",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "self",
"summary": "SUSE Bug 1202700",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "self",
"summary": "SUSE Bug 1202710",
"url": "https://bugzilla.suse.com/1202710"
},
{
"category": "self",
"summary": "SUSE Bug 1202711",
"url": "https://bugzilla.suse.com/1202711"
},
{
"category": "self",
"summary": "SUSE Bug 1202712",
"url": "https://bugzilla.suse.com/1202712"
},
{
"category": "self",
"summary": "SUSE Bug 1202713",
"url": "https://bugzilla.suse.com/1202713"
},
{
"category": "self",
"summary": "SUSE Bug 1202715",
"url": "https://bugzilla.suse.com/1202715"
},
{
"category": "self",
"summary": "SUSE Bug 1202716",
"url": "https://bugzilla.suse.com/1202716"
},
{
"category": "self",
"summary": "SUSE Bug 1202757",
"url": "https://bugzilla.suse.com/1202757"
},
{
"category": "self",
"summary": "SUSE Bug 1202758",
"url": "https://bugzilla.suse.com/1202758"
},
{
"category": "self",
"summary": "SUSE Bug 1202759",
"url": "https://bugzilla.suse.com/1202759"
},
{
"category": "self",
"summary": "SUSE Bug 1202761",
"url": "https://bugzilla.suse.com/1202761"
},
{
"category": "self",
"summary": "SUSE Bug 1202762",
"url": "https://bugzilla.suse.com/1202762"
},
{
"category": "self",
"summary": "SUSE Bug 1202763",
"url": "https://bugzilla.suse.com/1202763"
},
{
"category": "self",
"summary": "SUSE Bug 1202764",
"url": "https://bugzilla.suse.com/1202764"
},
{
"category": "self",
"summary": "SUSE Bug 1202765",
"url": "https://bugzilla.suse.com/1202765"
},
{
"category": "self",
"summary": "SUSE Bug 1202766",
"url": "https://bugzilla.suse.com/1202766"
},
{
"category": "self",
"summary": "SUSE Bug 1202767",
"url": "https://bugzilla.suse.com/1202767"
},
{
"category": "self",
"summary": "SUSE Bug 1202768",
"url": "https://bugzilla.suse.com/1202768"
},
{
"category": "self",
"summary": "SUSE Bug 1202769",
"url": "https://bugzilla.suse.com/1202769"
},
{
"category": "self",
"summary": "SUSE Bug 1202770",
"url": "https://bugzilla.suse.com/1202770"
},
{
"category": "self",
"summary": "SUSE Bug 1202771",
"url": "https://bugzilla.suse.com/1202771"
},
{
"category": "self",
"summary": "SUSE Bug 1202773",
"url": "https://bugzilla.suse.com/1202773"
},
{
"category": "self",
"summary": "SUSE Bug 1202774",
"url": "https://bugzilla.suse.com/1202774"
},
{
"category": "self",
"summary": "SUSE Bug 1202775",
"url": "https://bugzilla.suse.com/1202775"
},
{
"category": "self",
"summary": "SUSE Bug 1202776",
"url": "https://bugzilla.suse.com/1202776"
},
{
"category": "self",
"summary": "SUSE Bug 1202778",
"url": "https://bugzilla.suse.com/1202778"
},
{
"category": "self",
"summary": "SUSE Bug 1202779",
"url": "https://bugzilla.suse.com/1202779"
},
{
"category": "self",
"summary": "SUSE Bug 1202780",
"url": "https://bugzilla.suse.com/1202780"
},
{
"category": "self",
"summary": "SUSE Bug 1202781",
"url": "https://bugzilla.suse.com/1202781"
},
{
"category": "self",
"summary": "SUSE Bug 1202782",
"url": "https://bugzilla.suse.com/1202782"
},
{
"category": "self",
"summary": "SUSE Bug 1202783",
"url": "https://bugzilla.suse.com/1202783"
},
{
"category": "self",
"summary": "SUSE Bug 1202822",
"url": "https://bugzilla.suse.com/1202822"
},
{
"category": "self",
"summary": "SUSE Bug 1202823",
"url": "https://bugzilla.suse.com/1202823"
},
{
"category": "self",
"summary": "SUSE Bug 1202824",
"url": "https://bugzilla.suse.com/1202824"
},
{
"category": "self",
"summary": "SUSE Bug 1202860",
"url": "https://bugzilla.suse.com/1202860"
},
{
"category": "self",
"summary": "SUSE Bug 1202867",
"url": "https://bugzilla.suse.com/1202867"
},
{
"category": "self",
"summary": "SUSE Bug 1202872",
"url": "https://bugzilla.suse.com/1202872"
},
{
"category": "self",
"summary": "SUSE Bug 1202874",
"url": "https://bugzilla.suse.com/1202874"
},
{
"category": "self",
"summary": "SUSE Bug 1202898",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "self",
"summary": "SUSE Bug 1202914",
"url": "https://bugzilla.suse.com/1202914"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1202989",
"url": "https://bugzilla.suse.com/1202989"
},
{
"category": "self",
"summary": "SUSE Bug 1202992",
"url": "https://bugzilla.suse.com/1202992"
},
{
"category": "self",
"summary": "SUSE Bug 1202993",
"url": "https://bugzilla.suse.com/1202993"
},
{
"category": "self",
"summary": "SUSE Bug 1203002",
"url": "https://bugzilla.suse.com/1203002"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203036",
"url": "https://bugzilla.suse.com/1203036"
},
{
"category": "self",
"summary": "SUSE Bug 1203039",
"url": "https://bugzilla.suse.com/1203039"
},
{
"category": "self",
"summary": "SUSE Bug 1203041",
"url": "https://bugzilla.suse.com/1203041"
},
{
"category": "self",
"summary": "SUSE Bug 1203063",
"url": "https://bugzilla.suse.com/1203063"
},
{
"category": "self",
"summary": "SUSE Bug 1203066",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "self",
"summary": "SUSE Bug 1203067",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203101",
"url": "https://bugzilla.suse.com/1203101"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203116",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "self",
"summary": "SUSE Bug 1203117",
"url": "https://bugzilla.suse.com/1203117"
},
{
"category": "self",
"summary": "SUSE Bug 1203138",
"url": "https://bugzilla.suse.com/1203138"
},
{
"category": "self",
"summary": "SUSE Bug 1203139",
"url": "https://bugzilla.suse.com/1203139"
},
{
"category": "self",
"summary": "SUSE Bug 1203159",
"url": "https://bugzilla.suse.com/1203159"
},
{
"category": "self",
"summary": "SUSE Bug 1203183",
"url": "https://bugzilla.suse.com/1203183"
},
{
"category": "self",
"summary": "SUSE Bug 1203197",
"url": "https://bugzilla.suse.com/1203197"
},
{
"category": "self",
"summary": "SUSE Bug 1203208",
"url": "https://bugzilla.suse.com/1203208"
},
{
"category": "self",
"summary": "SUSE Bug 1203229",
"url": "https://bugzilla.suse.com/1203229"
},
{
"category": "self",
"summary": "SUSE Bug 1203263",
"url": "https://bugzilla.suse.com/1203263"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203338",
"url": "https://bugzilla.suse.com/1203338"
},
{
"category": "self",
"summary": "SUSE Bug 1203360",
"url": "https://bugzilla.suse.com/1203360"
},
{
"category": "self",
"summary": "SUSE Bug 1203361",
"url": "https://bugzilla.suse.com/1203361"
},
{
"category": "self",
"summary": "SUSE Bug 1203389",
"url": "https://bugzilla.suse.com/1203389"
},
{
"category": "self",
"summary": "SUSE Bug 1203391",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203435",
"url": "https://bugzilla.suse.com/1203435"
},
{
"category": "self",
"summary": "SUSE Bug 1203505",
"url": "https://bugzilla.suse.com/1203505"
},
{
"category": "self",
"summary": "SUSE Bug 1203511",
"url": "https://bugzilla.suse.com/1203511"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1203664",
"url": "https://bugzilla.suse.com/1203664"
},
{
"category": "self",
"summary": "SUSE Bug 1203693",
"url": "https://bugzilla.suse.com/1203693"
},
{
"category": "self",
"summary": "SUSE Bug 1203699",
"url": "https://bugzilla.suse.com/1203699"
},
{
"category": "self",
"summary": "SUSE Bug 1203767",
"url": "https://bugzilla.suse.com/1203767"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203770",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "self",
"summary": "SUSE Bug 1203794",
"url": "https://bugzilla.suse.com/1203794"
},
{
"category": "self",
"summary": "SUSE Bug 1203798",
"url": "https://bugzilla.suse.com/1203798"
},
{
"category": "self",
"summary": "SUSE Bug 1203802",
"url": "https://bugzilla.suse.com/1203802"
},
{
"category": "self",
"summary": "SUSE Bug 1203829",
"url": "https://bugzilla.suse.com/1203829"
},
{
"category": "self",
"summary": "SUSE Bug 1203893",
"url": "https://bugzilla.suse.com/1203893"
},
{
"category": "self",
"summary": "SUSE Bug 1203902",
"url": "https://bugzilla.suse.com/1203902"
},
{
"category": "self",
"summary": "SUSE Bug 1203906",
"url": "https://bugzilla.suse.com/1203906"
},
{
"category": "self",
"summary": "SUSE Bug 1203908",
"url": "https://bugzilla.suse.com/1203908"
},
{
"category": "self",
"summary": "SUSE Bug 1203922",
"url": "https://bugzilla.suse.com/1203922"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203939",
"url": "https://bugzilla.suse.com/1203939"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1203969",
"url": "https://bugzilla.suse.com/1203969"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE Bug 1203994",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "self",
"summary": "SUSE Bug 1204017",
"url": "https://bugzilla.suse.com/1204017"
},
{
"category": "self",
"summary": "SUSE Bug 1204051",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "self",
"summary": "SUSE Bug 1204059",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "self",
"summary": "SUSE Bug 1204060",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "self",
"summary": "SUSE Bug 1204092",
"url": "https://bugzilla.suse.com/1204092"
},
{
"category": "self",
"summary": "SUSE Bug 1204125",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "self",
"summary": "SUSE Bug 1204132",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "self",
"summary": "SUSE Bug 1204142",
"url": "https://bugzilla.suse.com/1204142"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204168",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "self",
"summary": "SUSE Bug 1204170",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "self",
"summary": "SUSE Bug 1204171",
"url": "https://bugzilla.suse.com/1204171"
},
{
"category": "self",
"summary": "SUSE Bug 1204183",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "self",
"summary": "SUSE Bug 1204228",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "self",
"summary": "SUSE Bug 1204241",
"url": "https://bugzilla.suse.com/1204241"
},
{
"category": "self",
"summary": "SUSE Bug 1204289",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "self",
"summary": "SUSE Bug 1204290",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "self",
"summary": "SUSE Bug 1204291",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "self",
"summary": "SUSE Bug 1204292",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "self",
"summary": "SUSE Bug 1204353",
"url": "https://bugzilla.suse.com/1204353"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204355",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "self",
"summary": "SUSE Bug 1204402",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "self",
"summary": "SUSE Bug 1204405",
"url": "https://bugzilla.suse.com/1204405"
},
{
"category": "self",
"summary": "SUSE Bug 1204413",
"url": "https://bugzilla.suse.com/1204413"
},
{
"category": "self",
"summary": "SUSE Bug 1204414",
"url": "https://bugzilla.suse.com/1204414"
},
{
"category": "self",
"summary": "SUSE Bug 1204415",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "self",
"summary": "SUSE Bug 1204417",
"url": "https://bugzilla.suse.com/1204417"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204428",
"url": "https://bugzilla.suse.com/1204428"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204432",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204470",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "self",
"summary": "SUSE Bug 1204479",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204498",
"url": "https://bugzilla.suse.com/1204498"
},
{
"category": "self",
"summary": "SUSE Bug 1204533",
"url": "https://bugzilla.suse.com/1204533"
},
{
"category": "self",
"summary": "SUSE Bug 1204569",
"url": "https://bugzilla.suse.com/1204569"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204575",
"url": "https://bugzilla.suse.com/1204575"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204619",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204635",
"url": "https://bugzilla.suse.com/1204635"
},
{
"category": "self",
"summary": "SUSE Bug 1204636",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "self",
"summary": "SUSE Bug 1204637",
"url": "https://bugzilla.suse.com/1204637"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204650",
"url": "https://bugzilla.suse.com/1204650"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204693",
"url": "https://bugzilla.suse.com/1204693"
},
{
"category": "self",
"summary": "SUSE Bug 1204705",
"url": "https://bugzilla.suse.com/1204705"
},
{
"category": "self",
"summary": "SUSE Bug 1204719",
"url": "https://bugzilla.suse.com/1204719"
},
{
"category": "self",
"summary": "SUSE Bug 1204728",
"url": "https://bugzilla.suse.com/1204728"
},
{
"category": "self",
"summary": "SUSE Bug 1204745",
"url": "https://bugzilla.suse.com/1204745"
},
{
"category": "self",
"summary": "SUSE Bug 1204753",
"url": "https://bugzilla.suse.com/1204753"
},
{
"category": "self",
"summary": "SUSE Bug 1204780",
"url": "https://bugzilla.suse.com/1204780"
},
{
"category": "self",
"summary": "SUSE Bug 1204810",
"url": "https://bugzilla.suse.com/1204810"
},
{
"category": "self",
"summary": "SUSE Bug 1204850",
"url": "https://bugzilla.suse.com/1204850"
},
{
"category": "self",
"summary": "SUSE Bug 1204868",
"url": "https://bugzilla.suse.com/1204868"
},
{
"category": "self",
"summary": "SUSE Bug 1204926",
"url": "https://bugzilla.suse.com/1204926"
},
{
"category": "self",
"summary": "SUSE Bug 1204933",
"url": "https://bugzilla.suse.com/1204933"
},
{
"category": "self",
"summary": "SUSE Bug 1204934",
"url": "https://bugzilla.suse.com/1204934"
},
{
"category": "self",
"summary": "SUSE Bug 1204947",
"url": "https://bugzilla.suse.com/1204947"
},
{
"category": "self",
"summary": "SUSE Bug 1204957",
"url": "https://bugzilla.suse.com/1204957"
},
{
"category": "self",
"summary": "SUSE Bug 1204963",
"url": "https://bugzilla.suse.com/1204963"
},
{
"category": "self",
"summary": "SUSE Bug 1204970",
"url": "https://bugzilla.suse.com/1204970"
},
{
"category": "self",
"summary": "SUSE Bug 1205007",
"url": "https://bugzilla.suse.com/1205007"
},
{
"category": "self",
"summary": "SUSE Bug 1205100",
"url": "https://bugzilla.suse.com/1205100"
},
{
"category": "self",
"summary": "SUSE Bug 1205111",
"url": "https://bugzilla.suse.com/1205111"
},
{
"category": "self",
"summary": "SUSE Bug 1205113",
"url": "https://bugzilla.suse.com/1205113"
},
{
"category": "self",
"summary": "SUSE Bug 1205128",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205149",
"url": "https://bugzilla.suse.com/1205149"
},
{
"category": "self",
"summary": "SUSE Bug 1205153",
"url": "https://bugzilla.suse.com/1205153"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205257",
"url": "https://bugzilla.suse.com/1205257"
},
{
"category": "self",
"summary": "SUSE Bug 1205264",
"url": "https://bugzilla.suse.com/1205264"
},
{
"category": "self",
"summary": "SUSE Bug 1205282",
"url": "https://bugzilla.suse.com/1205282"
},
{
"category": "self",
"summary": "SUSE Bug 1205313",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "self",
"summary": "SUSE Bug 1205331",
"url": "https://bugzilla.suse.com/1205331"
},
{
"category": "self",
"summary": "SUSE Bug 1205332",
"url": "https://bugzilla.suse.com/1205332"
},
{
"category": "self",
"summary": "SUSE Bug 1205427",
"url": "https://bugzilla.suse.com/1205427"
},
{
"category": "self",
"summary": "SUSE Bug 1205428",
"url": "https://bugzilla.suse.com/1205428"
},
{
"category": "self",
"summary": "SUSE Bug 1205473",
"url": "https://bugzilla.suse.com/1205473"
},
{
"category": "self",
"summary": "SUSE Bug 1205496",
"url": "https://bugzilla.suse.com/1205496"
},
{
"category": "self",
"summary": "SUSE Bug 1205507",
"url": "https://bugzilla.suse.com/1205507"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205521",
"url": "https://bugzilla.suse.com/1205521"
},
{
"category": "self",
"summary": "SUSE Bug 1205567",
"url": "https://bugzilla.suse.com/1205567"
},
{
"category": "self",
"summary": "SUSE Bug 1205616",
"url": "https://bugzilla.suse.com/1205616"
},
{
"category": "self",
"summary": "SUSE Bug 1205617",
"url": "https://bugzilla.suse.com/1205617"
},
{
"category": "self",
"summary": "SUSE Bug 1205653",
"url": "https://bugzilla.suse.com/1205653"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205679",
"url": "https://bugzilla.suse.com/1205679"
},
{
"category": "self",
"summary": "SUSE Bug 1205683",
"url": "https://bugzilla.suse.com/1205683"
},
{
"category": "self",
"summary": "SUSE Bug 1205700",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "self",
"summary": "SUSE Bug 1205705",
"url": "https://bugzilla.suse.com/1205705"
},
{
"category": "self",
"summary": "SUSE Bug 1205709",
"url": "https://bugzilla.suse.com/1205709"
},
{
"category": "self",
"summary": "SUSE Bug 1205711",
"url": "https://bugzilla.suse.com/1205711"
},
{
"category": "self",
"summary": "SUSE Bug 1205744",
"url": "https://bugzilla.suse.com/1205744"
},
{
"category": "self",
"summary": "SUSE Bug 1205764",
"url": "https://bugzilla.suse.com/1205764"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1205882",
"url": "https://bugzilla.suse.com/1205882"
},
{
"category": "self",
"summary": "SUSE Bug 1205993",
"url": "https://bugzilla.suse.com/1205993"
},
{
"category": "self",
"summary": "SUSE Bug 1206035",
"url": "https://bugzilla.suse.com/1206035"
},
{
"category": "self",
"summary": "SUSE Bug 1206036",
"url": "https://bugzilla.suse.com/1206036"
},
{
"category": "self",
"summary": "SUSE Bug 1206037",
"url": "https://bugzilla.suse.com/1206037"
},
{
"category": "self",
"summary": "SUSE Bug 1206045",
"url": "https://bugzilla.suse.com/1206045"
},
{
"category": "self",
"summary": "SUSE Bug 1206046",
"url": "https://bugzilla.suse.com/1206046"
},
{
"category": "self",
"summary": "SUSE Bug 1206047",
"url": "https://bugzilla.suse.com/1206047"
},
{
"category": "self",
"summary": "SUSE Bug 1206048",
"url": "https://bugzilla.suse.com/1206048"
},
{
"category": "self",
"summary": "SUSE Bug 1206049",
"url": "https://bugzilla.suse.com/1206049"
},
{
"category": "self",
"summary": "SUSE Bug 1206050",
"url": "https://bugzilla.suse.com/1206050"
},
{
"category": "self",
"summary": "SUSE Bug 1206051",
"url": "https://bugzilla.suse.com/1206051"
},
{
"category": "self",
"summary": "SUSE Bug 1206056",
"url": "https://bugzilla.suse.com/1206056"
},
{
"category": "self",
"summary": "SUSE Bug 1206057",
"url": "https://bugzilla.suse.com/1206057"
},
{
"category": "self",
"summary": "SUSE Bug 1206113",
"url": "https://bugzilla.suse.com/1206113"
},
{
"category": "self",
"summary": "SUSE Bug 1206114",
"url": "https://bugzilla.suse.com/1206114"
},
{
"category": "self",
"summary": "SUSE Bug 1206147",
"url": "https://bugzilla.suse.com/1206147"
},
{
"category": "self",
"summary": "SUSE Bug 1206149",
"url": "https://bugzilla.suse.com/1206149"
},
{
"category": "self",
"summary": "SUSE Bug 1206207",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "self",
"summary": "SUSE Bug 1206273",
"url": "https://bugzilla.suse.com/1206273"
},
{
"category": "self",
"summary": "SUSE Bug 1206391",
"url": "https://bugzilla.suse.com/1206391"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16119 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36516 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33135 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4037 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1184 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1263 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1882 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20369 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26373 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2639 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28356 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2873 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2905 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2959 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2977 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2978 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3028 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3078 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3114 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3176 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3202 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32250 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3435 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3521 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3526 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3535 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3566 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3619 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3625 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3633 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36946 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3707 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39189 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39190 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40476 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40476/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42328 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42329 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42703 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42895 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42896 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45869 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45888 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-12-23T10:39:17Z",
"generator": {
"date": "2022-12-23T10:39:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4617-1",
"initial_release_date": "2022-12-23T10:39:17Z",
"revision_history": [
{
"date": "2022-12-23T10:39:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"product": {
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"product_id": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"product": {
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"product_id": "kernel-source-rt-5.14.21-150400.15.5.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP4",
"product": {
"name": "SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
"product_id": "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch"
},
"product_reference": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2020-16119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16119"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16119",
"url": "https://www.suse.com/security/cve/CVE-2020-16119"
},
{
"category": "external",
"summary": "SUSE Bug 1177471 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "external",
"summary": "SUSE Bug 1177742 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2020-16119"
},
{
"cve": "CVE-2020-36516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36516"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36516",
"url": "https://www.suse.com/security/cve/CVE-2020-36516"
},
{
"category": "external",
"summary": "SUSE Bug 1196616 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "external",
"summary": "SUSE Bug 1196867 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "external",
"summary": "SUSE Bug 1204092 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204092"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2021-33135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33135"
}
],
"notes": [
{
"category": "general",
"text": "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33135",
"url": "https://www.suse.com/security/cve/CVE-2021-33135"
},
{
"category": "external",
"summary": "SUSE Bug 1199515 for CVE-2021-33135",
"url": "https://bugzilla.suse.com/1199515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-33135"
},
{
"cve": "CVE-2021-4037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4037"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4037",
"url": "https://www.suse.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2021-4037",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2022-1184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1184"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1184",
"url": "https://www.suse.com/security/cve/CVE-2022-1184"
},
{
"category": "external",
"summary": "SUSE Bug 1198577 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "external",
"summary": "SUSE Bug 1210859 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1210859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1263"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1263",
"url": "https://www.suse.com/security/cve/CVE-2022-1263"
},
{
"category": "external",
"summary": "SUSE Bug 1198189 for CVE-2022-1263",
"url": "https://bugzilla.suse.com/1198189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-1263"
},
{
"cve": "CVE-2022-1882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1882"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1882",
"url": "https://www.suse.com/security/cve/CVE-2022-1882"
},
{
"category": "external",
"summary": "SUSE Bug 1199904 for CVE-2022-1882",
"url": "https://bugzilla.suse.com/1199904"
},
{
"category": "external",
"summary": "SUSE Bug 1200058 for CVE-2022-1882",
"url": "https://bugzilla.suse.com/1200058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20369"
}
],
"notes": [
{
"category": "general",
"text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20369",
"url": "https://www.suse.com/security/cve/CVE-2022-20369"
},
{
"category": "external",
"summary": "SUSE Bug 1202347 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "external",
"summary": "SUSE Bug 1212321 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1212321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2153"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2153",
"url": "https://www.suse.com/security/cve/CVE-2022-2153"
},
{
"category": "external",
"summary": "SUSE Bug 1200788 for CVE-2022-2153",
"url": "https://bugzilla.suse.com/1200788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2602"
}
],
"notes": [
{
"category": "general",
"text": "io_uring UAF, Unix SCM garbage collection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2602",
"url": "https://www.suse.com/security/cve/CVE-2022-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1204228 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1204228"
},
{
"category": "external",
"summary": "SUSE Bug 1205186 for CVE-2022-2602",
"url": "https://bugzilla.suse.com/1205186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-26373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26373"
}
],
"notes": [
{
"category": "general",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26373",
"url": "https://www.suse.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "SUSE Bug 1201726 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "external",
"summary": "SUSE Bug 1209619 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1209619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2639"
}
],
"notes": [
{
"category": "general",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2639",
"url": "https://www.suse.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "SUSE Bug 1202154 for CVE-2022-2639",
"url": "https://bugzilla.suse.com/1202154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-28356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28356",
"url": "https://www.suse.com/security/cve/CVE-2022-28356"
},
{
"category": "external",
"summary": "SUSE Bug 1197391 for CVE-2022-28356",
"url": "https://bugzilla.suse.com/1197391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-28356"
},
{
"cve": "CVE-2022-28693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28693"
}
],
"notes": [
{
"category": "general",
"text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28693",
"url": "https://www.suse.com/security/cve/CVE-2022-28693"
},
{
"category": "external",
"summary": "SUSE Bug 1201455 for CVE-2022-28693",
"url": "https://bugzilla.suse.com/1201455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2873"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u0027s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2873",
"url": "https://www.suse.com/security/cve/CVE-2022-2873"
},
{
"category": "external",
"summary": "SUSE Bug 1202558 for CVE-2022-2873",
"url": "https://bugzilla.suse.com/1202558"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2873"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2905"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2905",
"url": "https://www.suse.com/security/cve/CVE-2022-2905"
},
{
"category": "external",
"summary": "SUSE Bug 1202860 for CVE-2022-2905",
"url": "https://bugzilla.suse.com/1202860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2938"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2938",
"url": "https://www.suse.com/security/cve/CVE-2022-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1202623 for CVE-2022-2938",
"url": "https://bugzilla.suse.com/1202623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2938"
},
{
"cve": "CVE-2022-2959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2959"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2959",
"url": "https://www.suse.com/security/cve/CVE-2022-2959"
},
{
"category": "external",
"summary": "SUSE Bug 1202681 for CVE-2022-2959",
"url": "https://bugzilla.suse.com/1202681"
},
{
"category": "external",
"summary": "SUSE Bug 1202685 for CVE-2022-2959",
"url": "https://bugzilla.suse.com/1202685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2977"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2977",
"url": "https://www.suse.com/security/cve/CVE-2022-2977"
},
{
"category": "external",
"summary": "SUSE Bug 1202672 for CVE-2022-2977",
"url": "https://bugzilla.suse.com/1202672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2978"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2978",
"url": "https://www.suse.com/security/cve/CVE-2022-2978"
},
{
"category": "external",
"summary": "SUSE Bug 1202700 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1202700"
},
{
"category": "external",
"summary": "SUSE Bug 1204745 for CVE-2022-2978",
"url": "https://bugzilla.suse.com/1204745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3028"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3028",
"url": "https://www.suse.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "SUSE Bug 1202898 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "external",
"summary": "SUSE Bug 1212296 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1212296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3078"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3078",
"url": "https://www.suse.com/security/cve/CVE-2022-3078"
},
{
"category": "external",
"summary": "SUSE Bug 1203041 for CVE-2022-3078",
"url": "https://bugzilla.suse.com/1203041"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3078"
},
{
"cve": "CVE-2022-3114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3114"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3114",
"url": "https://www.suse.com/security/cve/CVE-2022-3114"
},
{
"category": "external",
"summary": "SUSE Bug 1206391 for CVE-2022-3114",
"url": "https://bugzilla.suse.com/1206391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3114"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3176"
}
],
"notes": [
{
"category": "general",
"text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn\u0027t handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3176",
"url": "https://www.suse.com/security/cve/CVE-2022-3176"
},
{
"category": "external",
"summary": "SUSE Bug 1203391 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203391"
},
{
"category": "external",
"summary": "SUSE Bug 1203511 for CVE-2022-3176",
"url": "https://bugzilla.suse.com/1203511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3176"
},
{
"cve": "CVE-2022-3202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3202"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3202",
"url": "https://www.suse.com/security/cve/CVE-2022-3202"
},
{
"category": "external",
"summary": "SUSE Bug 1203389 for CVE-2022-3202",
"url": "https://bugzilla.suse.com/1203389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3202"
},
{
"cve": "CVE-2022-32250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32250"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32250",
"url": "https://www.suse.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1202992 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202992"
},
{
"category": "external",
"summary": "SUSE Bug 1202993 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202993"
},
{
"category": "external",
"summary": "SUSE Bug 1203002 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1203002"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-32296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32296"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32296",
"url": "https://www.suse.com/security/cve/CVE-2022-32296"
},
{
"category": "external",
"summary": "SUSE Bug 1200288 for CVE-2022-32296",
"url": "https://bugzilla.suse.com/1200288"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3435"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3435",
"url": "https://www.suse.com/security/cve/CVE-2022-3435"
},
{
"category": "external",
"summary": "SUSE Bug 1204171 for CVE-2022-3435",
"url": "https://bugzilla.suse.com/1204171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3521"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3521",
"url": "https://www.suse.com/security/cve/CVE-2022-3521"
},
{
"category": "external",
"summary": "SUSE Bug 1204355 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1204355"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3521",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3526"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3526",
"url": "https://www.suse.com/security/cve/CVE-2022-3526"
},
{
"category": "external",
"summary": "SUSE Bug 1204353 for CVE-2022-3526",
"url": "https://bugzilla.suse.com/1204353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3526"
},
{
"cve": "CVE-2022-3535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3535"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3535",
"url": "https://www.suse.com/security/cve/CVE-2022-3535"
},
{
"category": "external",
"summary": "SUSE Bug 1204417 for CVE-2022-3535",
"url": "https://bugzilla.suse.com/1204417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3535"
},
{
"cve": "CVE-2022-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3542"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3542",
"url": "https://www.suse.com/security/cve/CVE-2022-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1204402 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1204402"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3542",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3566"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3566",
"url": "https://www.suse.com/security/cve/CVE-2022-3566"
},
{
"category": "external",
"summary": "SUSE Bug 1204405 for CVE-2022-3566",
"url": "https://bugzilla.suse.com/1204405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3567"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3567",
"url": "https://www.suse.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1204414 for CVE-2022-3567",
"url": "https://bugzilla.suse.com/1204414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3594"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3594",
"url": "https://www.suse.com/security/cve/CVE-2022-3594"
},
{
"category": "external",
"summary": "SUSE Bug 1204479 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1204479"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-3594",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3619"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3619",
"url": "https://www.suse.com/security/cve/CVE-2022-3619"
},
{
"category": "external",
"summary": "SUSE Bug 1204569 for CVE-2022-3619",
"url": "https://bugzilla.suse.com/1204569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3619"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3625"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3625",
"url": "https://www.suse.com/security/cve/CVE-2022-3625"
},
{
"category": "external",
"summary": "SUSE Bug 1204637 for CVE-2022-3625",
"url": "https://bugzilla.suse.com/1204637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3629"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3629",
"url": "https://www.suse.com/security/cve/CVE-2022-3629"
},
{
"category": "external",
"summary": "SUSE Bug 1204635 for CVE-2022-3629",
"url": "https://bugzilla.suse.com/1204635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3633"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3633",
"url": "https://www.suse.com/security/cve/CVE-2022-3633"
},
{
"category": "external",
"summary": "SUSE Bug 1204650 for CVE-2022-3633",
"url": "https://bugzilla.suse.com/1204650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-3643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3643"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3643",
"url": "https://www.suse.com/security/cve/CVE-2022-3643"
},
{
"category": "external",
"summary": "SUSE Bug 1206113 for CVE-2022-3643",
"url": "https://bugzilla.suse.com/1206113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36879"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36879",
"url": "https://www.suse.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "SUSE Bug 1201948 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "external",
"summary": "SUSE Bug 1212327 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1212327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36946"
}
],
"notes": [
{
"category": "general",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36946",
"url": "https://www.suse.com/security/cve/CVE-2022-36946"
},
{
"category": "external",
"summary": "SUSE Bug 1201940 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1201940"
},
{
"category": "external",
"summary": "SUSE Bug 1201941 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1201941"
},
{
"category": "external",
"summary": "SUSE Bug 1202312 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1202312"
},
{
"category": "external",
"summary": "SUSE Bug 1202874 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1202874"
},
{
"category": "external",
"summary": "SUSE Bug 1203208 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1203208"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1212310 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1212310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3707"
}
],
"notes": [
{
"category": "general",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3707",
"url": "https://www.suse.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "SUSE Bug 1204780 for CVE-2022-3707",
"url": "https://bugzilla.suse.com/1204780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39189"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39189",
"url": "https://www.suse.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "SUSE Bug 1203066 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "external",
"summary": "SUSE Bug 1203067 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-39190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39190"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39190",
"url": "https://www.suse.com/security/cve/CVE-2022-39190"
},
{
"category": "external",
"summary": "SUSE Bug 1203117 for CVE-2022-39190",
"url": "https://bugzilla.suse.com/1203117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40476",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40476"
}
],
"notes": [
{
"category": "general",
"text": "A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40476",
"url": "https://www.suse.com/security/cve/CVE-2022-40476"
},
{
"category": "external",
"summary": "SUSE Bug 1203435 for CVE-2022-40476",
"url": "https://bugzilla.suse.com/1203435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-40476"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4129"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4129",
"url": "https://www.suse.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "SUSE Bug 1205711 for CVE-2022-4129",
"url": "https://bugzilla.suse.com/1205711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-42328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42328"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42328",
"url": "https://www.suse.com/security/cve/CVE-2022-42328"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42328",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42329"
}
],
"notes": [
{
"category": "general",
"text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42329",
"url": "https://www.suse.com/security/cve/CVE-2022-42329"
},
{
"category": "external",
"summary": "SUSE Bug 1206114 for CVE-2022-42329",
"url": "https://bugzilla.suse.com/1206114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42703"
}
],
"notes": [
{
"category": "general",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42703",
"url": "https://www.suse.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1204168 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204168"
},
{
"category": "external",
"summary": "SUSE Bug 1204170 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1204170"
},
{
"category": "external",
"summary": "SUSE Bug 1206463 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1206463"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42703",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42895"
}
],
"notes": [
{
"category": "general",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.\nWe recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url \n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42895",
"url": "https://www.suse.com/security/cve/CVE-2022-42895"
},
{
"category": "external",
"summary": "SUSE Bug 1205705 for CVE-2022-42895",
"url": "https://bugzilla.suse.com/1205705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42896"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.\n\nWe recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url \n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42896",
"url": "https://www.suse.com/security/cve/CVE-2022-42896"
},
{
"category": "external",
"summary": "SUSE Bug 1205709 for CVE-2022-42896",
"url": "https://bugzilla.suse.com/1205709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-45869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45869"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45869",
"url": "https://www.suse.com/security/cve/CVE-2022-45869"
},
{
"category": "external",
"summary": "SUSE Bug 1205882 for CVE-2022-45869",
"url": "https://bugzilla.suse.com/1205882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-45869"
},
{
"cve": "CVE-2022-45888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45888"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45888",
"url": "https://www.suse.com/security/cve/CVE-2022-45888"
},
{
"category": "external",
"summary": "SUSE Bug 1205764 for CVE-2022-45888",
"url": "https://bugzilla.suse.com/1205764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-45888"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
"SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
"openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-23T10:39:17Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
SUSE-SU-2022:4533-1
Vulnerability from csaf_suse - Published: 2022-12-17 18:34 - Updated: 2022-12-17 18:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150100_197_120 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4533,SUSE-SLE-Live-Patching-12-SP4-2022-4533,SUSE-SLE-Live-Patching-12-SP4-2022-4535,SUSE-SLE-Live-Patching-12-SP4-2022-4538,SUSE-SLE-Live-Patching-12-SP5-2022-4530,SUSE-SLE-Live-Patching-12-SP5-2022-4536,SUSE-SLE-Live-Patching-12-SP5-2022-4540,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4537",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4533-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4533-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224533-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4533-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-17T18:34:12Z",
"generator": {
"date": "2022-12-17T18:34:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4533-1",
"initial_release_date": "2022-12-17T18:34:12Z",
"revision_history": [
{
"date": "2022-12-17T18:34:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_105-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_108-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_124-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_120-default-5-150100.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:34:12Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4569-1
Vulnerability from csaf_suse - Published: 2022-12-19 12:34 - Updated: 2022-12-19 12:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_22 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4569,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4556,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4569,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4565",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4569-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4569-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224569-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4569-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-19T12:34:59Z",
"generator": {
"date": "2022-12-19T12:34:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4569-1",
"initial_release_date": "2022-12-19T12:34:59Z",
"revision_history": [
{
"date": "2022-12-19T12:34:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_68-preempt-10-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_68-preempt-10-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_68-preempt-10-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-11-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-10-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-9-150400.4.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:34:59Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4544-1
Vulnerability from csaf_suse - Published: 2022-12-17 23:34 - Updated: 2022-12-17 23:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_90 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4544,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4544",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4544-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4544-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224544-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4544-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T23:34:15Z",
"generator": {
"date": "2022-12-17T23:34:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4544-1",
"initial_release_date": "2022-12-17T23:34:15Z",
"revision_history": [
{
"date": "2022-12-17T23:34:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_90-preempt-6-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_90-preempt-6-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_90-preempt-6-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-6-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:15Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3775-1
Vulnerability from csaf_suse - Published: 2022-10-26 11:08 - Updated: 2022-10-26 11:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory. (bnc#1203514)\n- CVE-2022-3169: Fixed a denial of service flaw which occurs when consecutive requests to NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET are sent. (bnc#1203290)\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)\n- CVE-2022-42719: Fixed MBSSID parsing use-after-free. (bsc#1204051)\n- CVE-2022-42721: Avoid nontransmitted BSS list corruption. (bsc#1204060)\n- CVE-2022-42720: Fixed BSS refcounting bugs. (bsc#1204059)\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n- CVE-2022-20008: Fixed a bug which allowed to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. (bnc#1199564)\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)\n\nThe following non-security bugs were fixed:\n\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: fix spelling mistakes (git-fixes).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)\n- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes)\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)\n- arm64: mm: fix p?d_leaf() (git-fixes)\n- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)\n- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)\n- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)\n- arm64/mm: Validate hotplug range before creating linear mapping (git-fixes)\n- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- JFS: fix GPF in diFree (bsc#1203389).\n- JFS: fix memleak in jfs_mount (git-fixes).\n- JFS: more checks for invalid superblock (git-fixes).\n- JFS: prevent NULL deref in diFree (bsc#1203389).\n- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).\n- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: KEYS: s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).\n- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFS: Fix races in the legacy idmapper upcall (git-fixes).\n- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- of: device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).\n- regulator: core: Clean up on enable failure (git-fixes).\n- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).\n- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).\n- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).\n- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).\n- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).\n- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).\n- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).\n- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: smartpqi: Update LUN reset handler (bsc#1200622).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- squashfs: fix divide error in calculate_skip() (git-fixes).\n- struct ehci_hcd: hide new member (git-fixes).\n- struct otg_fsm: hide new boolean member in gap (git-fixes).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: fix expiry of auth creds (git-fixes).\n- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).\n- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- USB: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: dwc3: disable USB core PHY management (git-fixes).\n- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).\n- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: ch341: name prescaler, divisor registers (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xprtrdma: Fix cwnd update ordering (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3775,SUSE-SLE-Module-Basesystem-15-SP3-2022-3775,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3775,SUSE-SLE-Module-Legacy-15-SP3-2022-3775,SUSE-SLE-Module-Live-Patching-15-SP3-2022-3775,SUSE-SLE-Product-HA-15-SP3-2022-3775,SUSE-SLE-Product-WE-15-SP3-2022-3775,SUSE-SUSE-MicroOS-5.1-2022-3775,SUSE-SUSE-MicroOS-5.2-2022-3775,openSUSE-Leap-Micro-5.2-2022-3775,openSUSE-SLE-15.3-2022-3775,openSUSE-SLE-15.4-2022-3775",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3775-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3775-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223775-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3775-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html"
},
{
"category": "self",
"summary": "SUSE Bug 1177471",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1194023",
"url": "https://bugzilla.suse.com/1194023"
},
{
"category": "self",
"summary": "SUSE Bug 1196444",
"url": "https://bugzilla.suse.com/1196444"
},
{
"category": "self",
"summary": "SUSE Bug 1197659",
"url": "https://bugzilla.suse.com/1197659"
},
{
"category": "self",
"summary": "SUSE Bug 1199564",
"url": "https://bugzilla.suse.com/1199564"
},
{
"category": "self",
"summary": "SUSE Bug 1200313",
"url": "https://bugzilla.suse.com/1200313"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1201489",
"url": "https://bugzilla.suse.com/1201489"
},
{
"category": "self",
"summary": "SUSE Bug 1201645",
"url": "https://bugzilla.suse.com/1201645"
},
{
"category": "self",
"summary": "SUSE Bug 1201865",
"url": "https://bugzilla.suse.com/1201865"
},
{
"category": "self",
"summary": "SUSE Bug 1201990",
"url": "https://bugzilla.suse.com/1201990"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202341",
"url": "https://bugzilla.suse.com/1202341"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1202984",
"url": "https://bugzilla.suse.com/1202984"
},
{
"category": "self",
"summary": "SUSE Bug 1203159",
"url": "https://bugzilla.suse.com/1203159"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203313",
"url": "https://bugzilla.suse.com/1203313"
},
{
"category": "self",
"summary": "SUSE Bug 1203389",
"url": "https://bugzilla.suse.com/1203389"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203424",
"url": "https://bugzilla.suse.com/1203424"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203622",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "self",
"summary": "SUSE Bug 1203737",
"url": "https://bugzilla.suse.com/1203737"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203770",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "self",
"summary": "SUSE Bug 1203906",
"url": "https://bugzilla.suse.com/1203906"
},
{
"category": "self",
"summary": "SUSE Bug 1203909",
"url": "https://bugzilla.suse.com/1203909"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203939",
"url": "https://bugzilla.suse.com/1203939"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE Bug 1204051",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "self",
"summary": "SUSE Bug 1204059",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "self",
"summary": "SUSE Bug 1204060",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "self",
"summary": "SUSE Bug 1204125",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "self",
"summary": "SUSE Bug 1204289",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "self",
"summary": "SUSE Bug 1204290",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "self",
"summary": "SUSE Bug 1204291",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "self",
"summary": "SUSE Bug 1204292",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16119 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20008 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41222 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-26T11:08:04Z",
"generator": {
"date": "2022-10-26T11:08:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3775-1",
"initial_release_date": "2022-10-26T11:08:04Z",
"revision_history": [
{
"date": "2022-10-26T11:08:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.98.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.98.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.98.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.98.1.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.98.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.98.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.98.1.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.98.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.98.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.98.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.98.1.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.98.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.98.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.98.1.noarch",
"product_id": "kernel-source-5.3.18-150300.59.98.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.98.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-default-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-debug-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_98-preempt-1-150300.7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_98-preempt-1-150300.7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_98-preempt-1-150300.7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.98.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.98.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.98.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.98.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.98.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-altera-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-amd-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-apm-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-arm-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-lg-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.98.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.98.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-150300.59.98.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.98.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.98.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-150300.59.98.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-150300.59.98.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-150300.59.98.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16119"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16119",
"url": "https://www.suse.com/security/cve/CVE-2020-16119"
},
{
"category": "external",
"summary": "SUSE Bug 1177471 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "external",
"summary": "SUSE Bug 1177742 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2020-16119"
},
{
"cve": "CVE-2022-20008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20008"
}
],
"notes": [
{
"category": "general",
"text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20008",
"url": "https://www.suse.com/security/cve/CVE-2022-20008"
},
{
"category": "external",
"summary": "SUSE Bug 1199564 for CVE-2022-20008",
"url": "https://bugzilla.suse.com/1199564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-20008"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41222"
}
],
"notes": [
{
"category": "general",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41222",
"url": "https://www.suse.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "SUSE Bug 1203622 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "external",
"summary": "SUSE Bug 1203624 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1209476 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_98-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.98.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.98.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.98.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-26T11:08:04Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
}
]
}
SUSE-SU-2022:4506-1
Vulnerability from csaf_suse - Published: 2022-12-16 17:05 - Updated: 2022-12-16 17:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150100_197_114 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4506,SUSE-SLE-Live-Patching-12-SP4-2022-4506,SUSE-SLE-Live-Patching-12-SP5-2022-4509,SUSE-SLE-Module-Live-Patching-15-2022-4507,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4508,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4511,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4512",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4506-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4506-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224506-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4506-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-16T17:05:42Z",
"generator": {
"date": "2022-12-16T17:05:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4506-1",
"initial_release_date": "2022-12-16T17:05:42Z",
"revision_history": [
{
"date": "2022-12-16T17:05:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-7-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-5-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-2-150100.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_101-default-2-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T17:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3809-1
Vulnerability from csaf_suse - Published: 2022-10-31 08:28 - Updated: 2022-10-31 08:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2020-16119: Fixed a use-after-free due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released (bnc#1177471).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-2503: Fixed a LoadPin bypass in Dm-verity (bnc#1202677).\n- CVE-2022-2586: Fixed issue in netfilter that allowed CHAIN_ID to refer to another table (bsc#1202095).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-3169: Fixed a denial of service that resulted in a PCIe link disconnect (bnc#1203290).\n- CVE-2022-32296: Fixed issue where TCP servers were able to identify clients by observing what source ports are used (bnc#1200288).\n- CVE-2022-3239: Fixed a use-after-free in the video4linux driver (bnc#1203552).\n- CVE-2022-3303: Fixed a race at SNDCTL_DSP_SYNC (bsc#1203769).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c due to stex_queuecommand_lck lack a memset for the PASSTHRU_CMD case (bnc#1203514).\n- CVE-2022-41218: Fixed a use-after-free due to refcount races at releasing (bsc#1202960).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a use-after-free in mgslpc_ops (bsc#1203987).\n- CVE-2022-41849: Fixed a use-after-free in ufx_ops_open() (bsc#1203992).\n- CVE-2022-42719: Fixed MBSSID parsing use-after-free (bsc#1204051).\n- CVE-2022-42720: Fixed BSS refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Avoid nontransmitted BSS list corruption (bsc#1204060).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device (bsc#1204125).\n\nThe following non-security bugs were fixed:\n\n- Fixed parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- acpi: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- acpi: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- acpi: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- acpi: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bnc#1203802).\n- acpi: processor: Remove freq Qos request for all CPUs (git-fixes).\n- acpi: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- acpi: video: Force backlight native for some TongFang devices (git-fixes).\n- alsa: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- alsa: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- alsa: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- alsa: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- alsa: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- alsa: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- alsa: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- alsa: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).\n- alsa: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- alsa: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- alsa: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo L140PU (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- alsa: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- alsa: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- alsa: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- alsa: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- alsa: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- alsa: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- alsa: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- alsa: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- alsa: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).\n- alsa: hda/realtek: Fix deadlock by COEF mutex (git-fixes).\n- alsa: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).\n- alsa: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).\n- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- alsa: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- alsa: hda/sigmatel: Keep power up while beep is enabled (git-fixes).\n- alsa: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- alsa: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- alsa: info: Fix llseek return value when using callback (git-fixes).\n- alsa: seq: Fix data-race at module auto-loading (git-fixes).\n- alsa: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- alsa: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- alsa: usb-audio: Inform the delayed registration more properly (git-fixes).\n- alsa: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- alsa: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- alsa: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- alsa: usb-audio: fix spelling mistakes (git-fixes).\n- arm64/mm: Validate hotplug range before creating linear mapping (git-fixes)\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes)\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)\n- arm64: mm: fix p?d_leaf() (git-fixes)\n- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)\n- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)\n- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)\n- arm: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).\n- arm: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).\n- arm: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).\n- arm: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- asoc: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- asoc: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- asoc: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- asoc: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- asoc: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- asoc: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- asoc: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- asoc: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- asoc: tas2770: Allow mono streams (git-fixes).\n- asoc: tas2770: Reinit regcache on reset (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).\n- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).\n- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).\n- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).\n- blktrace: fix blk_rq_merge documentation (git-fixes).\n- bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: gs_usb: gs_can_open(): fix race dev-\u003ecan.state condition (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).\n- ceph: do not truncate file in atomic_open (bsc#1202811).\n- cgroup: Trace event cgroup id fields should be u64 (git-fixes).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).\n- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- ehea: fix error return code in ehea_restart_qps() (git-fixes).\n- enetc: Fix endianness issues for enetc_qos (git-fixes).\n- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203137).\n- fuse: ioctl: translate ENOSYS (bsc#1203136).\n- fuse: limit nsec (bsc#1203135).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- hid: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- hid: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- hid: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).\n- hid: wacom: Do not register pad_input for touch switch (git-fixes).\n- hid: wacom: Only report rotation for art pen (git-fixes).\n- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).\n- input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- input: rk805-pwrkey - fix module autoloading (git-fixes).\n- input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: ssif: initialize ssif_info-\u003eclient early (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (git-fixes).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- jfs: fix GPF in diFree (bsc#1203389).\n- jfs: fix memleak in jfs_mount (git-fixes).\n- jfs: more checks for invalid superblock (git-fixes).\n- jfs: prevent NULL deref in diFree (bsc#1203389).\n- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).\n- kabi: cgroup: Restore KABI of css_set (bsc#1201610).\n- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- kvm: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).\n- kvm: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- kvm: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- kvm: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- kvm: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- kvm: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).\n- kvm: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- kvm: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- kvm: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- kvm: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- kvm: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- kvm: x86: accept userspace interrupt only if no event is injected (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- list: add \u0027list_del_init_careful()\u0027 to go with \u0027list_empty_careful()\u0027 (bsc#1202745).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).\n- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).\n- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).\n- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).\n- net: cpsw: Properly initialise struct page_pool_params (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).\n- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).\n- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).\n- net: ethernet: ezchip: fix error handling (git-fixes).\n- net: ethernet: ezchip: remove redundant check (git-fixes).\n- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).\n- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).\n- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).\n- net: fec_ptp: add clock rate zero check (git-fixes).\n- net: hns: Fix kernel-doc (git-fixes).\n- net: lantiq: fix memory corruption in RX ring (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bsc#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bsc#1201309, jsc#PED-529).\n- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: netcp: Fix an error message (git-fixes).\n- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).\n- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfs: fix nfs_path in case of a rename retry (git-fixes).\n- nfsd: Add missing NFSv2 .pc_func methods (git-fixes).\n- nfsd: Clamp WRITE offsets (git-fixes).\n- nfsd: Fix offset type in I/O trace points (git-fixes).\n- nfsd: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nfsd: prevent integer overflow on 32 bit systems (git-fixes).\n- nfsd: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- nfsv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- nfsv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- nfsv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- nfsv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- nfsv4: Fix races in the legacy idmapper upcall (git-fixes).\n- nfsv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).\n- nfsv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- ntb: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- ocfs2: drop acl cache for directories too (bsc#1191667).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).\n- padata: make padata_free_shell() to respect pd\u0027s -\u003erefcnt (bsc#1202638).\n- parisc/sticon: fix reverse colors (bsc#1152489).\n- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)\n- pci/acpi: Guard ARM64-specific mcfg_quirks (git-fixes).\n- pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- pci: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- pci: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- pci: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- pci: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- pci: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- pci: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- pci: qcom: Fix pipe clock imbalance (git-fixes).\n- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).\n- pinctrl/rockchip: fix gpio device creation (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: define get_cycles macro for arch-override (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks \u0027find -xtype l\u0027 will report them, so use that to make the search a bit faster (without using shell).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: fix 2KB pgtable release race (git-fixes).\n- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).\n- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).\n- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).\n- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).\n- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).\n- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).\n- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).\n- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).\n- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: smartpqi: Update LUN reset handler (bsc#1200622).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- silence nfscache allocation warnings with kvzalloc (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- squashfs: fix divide error in calculate_skip() (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- struct ehci_hcd: hide new member (git-fixes).\n- struct otg_fsm: hide new boolean member in gap (git-fixes).\n- sunrpc: Clean up scheduling of autoclose (git-fixes).\n- sunrpc: Do not call connect() more than once on a TCP socket (git-fixes).\n- sunrpc: Do not dereference xprt-\u003esnd_task if it\u0027s a cookie (git-fixes).\n- sunrpc: Do not leak sockets in xs_local_connect() (git-fixes).\n- sunrpc: Fix READ_PLUS crasher (git-fixes).\n- sunrpc: Fix misplaced barrier in call_decode (git-fixes).\n- sunrpc: Prevent immediate close+reconnect (git-fixes).\n- sunrpc: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- sunrpc: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- sunrpc: fix expiry of auth creds (git-fixes).\n- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).\n- tee: optee: Fix incorrect page free bug (git-fixes).\n- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tty/serial: atmel: RS485 \u0026 ISO7816: wait for TXRDY before sending data (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- usb.h: struct usb_device: hide new member (git-fixes).\n- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- usb: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- usb: core: Fix RST error in hub.c (git-fixes).\n- usb: core: Prevent nested device-reset calls (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).\n- usb: dwc3: disable USB core PHY management (git-fixes).\n- usb: dwc3: ep0: Fix delay status handling (git-fixes).\n- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).\n- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).\n- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).\n- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings.\n- usb: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: otg-fsm: Fix hrtimer list corruption (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- usb: serial: ch341: fix lost character on LCR updates (git-fixes).\n- usb: serial: ch341: name prescaler, divisor registers (git-fixes).\n- usb: serial: cp210x: add Decagon UCA device id (git-fixes).\n- usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- usb: serial: option: add Quectel EM060K modem (git-fixes).\n- usb: serial: option: add Quectel RM520N (git-fixes).\n- usb: serial: option: add Quectel RM520N (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- usb: serial: option: add support for OPPO R11 diag port (git-fixes).\n- usb: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: ucsi: Remove incorrect warning (git-fixes).\n- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).\n- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).\n- usb: xhci-mtk: add some schedule error number (git-fixes).\n- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).\n- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).\n- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmci: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).\n- vmci: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).\n- vmci: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).\n- vmci: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).\n- vmci: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).\n- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).\n- xprtrdma: Fix cwnd update ordering (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3809,SUSE-SLE-Module-RT-15-SP3-2022-3809,SUSE-SUSE-MicroOS-5.1-2022-3809,SUSE-SUSE-MicroOS-5.2-2022-3809,openSUSE-Leap-Micro-5.2-2022-3809",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3809-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3809-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223809-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3809-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html"
},
{
"category": "self",
"summary": "SUSE Bug 1023051",
"url": "https://bugzilla.suse.com/1023051"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1177471",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "self",
"summary": "SUSE Bug 1179722",
"url": "https://bugzilla.suse.com/1179722"
},
{
"category": "self",
"summary": "SUSE Bug 1179723",
"url": "https://bugzilla.suse.com/1179723"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1191662",
"url": "https://bugzilla.suse.com/1191662"
},
{
"category": "self",
"summary": "SUSE Bug 1191667",
"url": "https://bugzilla.suse.com/1191667"
},
{
"category": "self",
"summary": "SUSE Bug 1191881",
"url": "https://bugzilla.suse.com/1191881"
},
{
"category": "self",
"summary": "SUSE Bug 1192594",
"url": "https://bugzilla.suse.com/1192594"
},
{
"category": "self",
"summary": "SUSE Bug 1194023",
"url": "https://bugzilla.suse.com/1194023"
},
{
"category": "self",
"summary": "SUSE Bug 1194272",
"url": "https://bugzilla.suse.com/1194272"
},
{
"category": "self",
"summary": "SUSE Bug 1194535",
"url": "https://bugzilla.suse.com/1194535"
},
{
"category": "self",
"summary": "SUSE Bug 1196444",
"url": "https://bugzilla.suse.com/1196444"
},
{
"category": "self",
"summary": "SUSE Bug 1197158",
"url": "https://bugzilla.suse.com/1197158"
},
{
"category": "self",
"summary": "SUSE Bug 1197659",
"url": "https://bugzilla.suse.com/1197659"
},
{
"category": "self",
"summary": "SUSE Bug 1197755",
"url": "https://bugzilla.suse.com/1197755"
},
{
"category": "self",
"summary": "SUSE Bug 1197756",
"url": "https://bugzilla.suse.com/1197756"
},
{
"category": "self",
"summary": "SUSE Bug 1197757",
"url": "https://bugzilla.suse.com/1197757"
},
{
"category": "self",
"summary": "SUSE Bug 1197760",
"url": "https://bugzilla.suse.com/1197760"
},
{
"category": "self",
"summary": "SUSE Bug 1197763",
"url": "https://bugzilla.suse.com/1197763"
},
{
"category": "self",
"summary": "SUSE Bug 1197920",
"url": "https://bugzilla.suse.com/1197920"
},
{
"category": "self",
"summary": "SUSE Bug 1198971",
"url": "https://bugzilla.suse.com/1198971"
},
{
"category": "self",
"summary": "SUSE Bug 1199291",
"url": "https://bugzilla.suse.com/1199291"
},
{
"category": "self",
"summary": "SUSE Bug 1200288",
"url": "https://bugzilla.suse.com/1200288"
},
{
"category": "self",
"summary": "SUSE Bug 1200313",
"url": "https://bugzilla.suse.com/1200313"
},
{
"category": "self",
"summary": "SUSE Bug 1200431",
"url": "https://bugzilla.suse.com/1200431"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1200868",
"url": "https://bugzilla.suse.com/1200868"
},
{
"category": "self",
"summary": "SUSE Bug 1200869",
"url": "https://bugzilla.suse.com/1200869"
},
{
"category": "self",
"summary": "SUSE Bug 1200870",
"url": "https://bugzilla.suse.com/1200870"
},
{
"category": "self",
"summary": "SUSE Bug 1200871",
"url": "https://bugzilla.suse.com/1200871"
},
{
"category": "self",
"summary": "SUSE Bug 1200872",
"url": "https://bugzilla.suse.com/1200872"
},
{
"category": "self",
"summary": "SUSE Bug 1200873",
"url": "https://bugzilla.suse.com/1200873"
},
{
"category": "self",
"summary": "SUSE Bug 1201019",
"url": "https://bugzilla.suse.com/1201019"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1201420",
"url": "https://bugzilla.suse.com/1201420"
},
{
"category": "self",
"summary": "SUSE Bug 1201489",
"url": "https://bugzilla.suse.com/1201489"
},
{
"category": "self",
"summary": "SUSE Bug 1201610",
"url": "https://bugzilla.suse.com/1201610"
},
{
"category": "self",
"summary": "SUSE Bug 1201705",
"url": "https://bugzilla.suse.com/1201705"
},
{
"category": "self",
"summary": "SUSE Bug 1201726",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "self",
"summary": "SUSE Bug 1201865",
"url": "https://bugzilla.suse.com/1201865"
},
{
"category": "self",
"summary": "SUSE Bug 1201948",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "self",
"summary": "SUSE Bug 1201990",
"url": "https://bugzilla.suse.com/1201990"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202096",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202341",
"url": "https://bugzilla.suse.com/1202341"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1202347",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202393",
"url": "https://bugzilla.suse.com/1202393"
},
{
"category": "self",
"summary": "SUSE Bug 1202396",
"url": "https://bugzilla.suse.com/1202396"
},
{
"category": "self",
"summary": "SUSE Bug 1202447",
"url": "https://bugzilla.suse.com/1202447"
},
{
"category": "self",
"summary": "SUSE Bug 1202577",
"url": "https://bugzilla.suse.com/1202577"
},
{
"category": "self",
"summary": "SUSE Bug 1202636",
"url": "https://bugzilla.suse.com/1202636"
},
{
"category": "self",
"summary": "SUSE Bug 1202638",
"url": "https://bugzilla.suse.com/1202638"
},
{
"category": "self",
"summary": "SUSE Bug 1202672",
"url": "https://bugzilla.suse.com/1202672"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202701",
"url": "https://bugzilla.suse.com/1202701"
},
{
"category": "self",
"summary": "SUSE Bug 1202708",
"url": "https://bugzilla.suse.com/1202708"
},
{
"category": "self",
"summary": "SUSE Bug 1202709",
"url": "https://bugzilla.suse.com/1202709"
},
{
"category": "self",
"summary": "SUSE Bug 1202710",
"url": "https://bugzilla.suse.com/1202710"
},
{
"category": "self",
"summary": "SUSE Bug 1202711",
"url": "https://bugzilla.suse.com/1202711"
},
{
"category": "self",
"summary": "SUSE Bug 1202712",
"url": "https://bugzilla.suse.com/1202712"
},
{
"category": "self",
"summary": "SUSE Bug 1202713",
"url": "https://bugzilla.suse.com/1202713"
},
{
"category": "self",
"summary": "SUSE Bug 1202714",
"url": "https://bugzilla.suse.com/1202714"
},
{
"category": "self",
"summary": "SUSE Bug 1202715",
"url": "https://bugzilla.suse.com/1202715"
},
{
"category": "self",
"summary": "SUSE Bug 1202716",
"url": "https://bugzilla.suse.com/1202716"
},
{
"category": "self",
"summary": "SUSE Bug 1202717",
"url": "https://bugzilla.suse.com/1202717"
},
{
"category": "self",
"summary": "SUSE Bug 1202718",
"url": "https://bugzilla.suse.com/1202718"
},
{
"category": "self",
"summary": "SUSE Bug 1202720",
"url": "https://bugzilla.suse.com/1202720"
},
{
"category": "self",
"summary": "SUSE Bug 1202722",
"url": "https://bugzilla.suse.com/1202722"
},
{
"category": "self",
"summary": "SUSE Bug 1202745",
"url": "https://bugzilla.suse.com/1202745"
},
{
"category": "self",
"summary": "SUSE Bug 1202756",
"url": "https://bugzilla.suse.com/1202756"
},
{
"category": "self",
"summary": "SUSE Bug 1202810",
"url": "https://bugzilla.suse.com/1202810"
},
{
"category": "self",
"summary": "SUSE Bug 1202811",
"url": "https://bugzilla.suse.com/1202811"
},
{
"category": "self",
"summary": "SUSE Bug 1202860",
"url": "https://bugzilla.suse.com/1202860"
},
{
"category": "self",
"summary": "SUSE Bug 1202895",
"url": "https://bugzilla.suse.com/1202895"
},
{
"category": "self",
"summary": "SUSE Bug 1202898",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1202984",
"url": "https://bugzilla.suse.com/1202984"
},
{
"category": "self",
"summary": "SUSE Bug 1203063",
"url": "https://bugzilla.suse.com/1203063"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203117",
"url": "https://bugzilla.suse.com/1203117"
},
{
"category": "self",
"summary": "SUSE Bug 1203135",
"url": "https://bugzilla.suse.com/1203135"
},
{
"category": "self",
"summary": "SUSE Bug 1203136",
"url": "https://bugzilla.suse.com/1203136"
},
{
"category": "self",
"summary": "SUSE Bug 1203137",
"url": "https://bugzilla.suse.com/1203137"
},
{
"category": "self",
"summary": "SUSE Bug 1203159",
"url": "https://bugzilla.suse.com/1203159"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203389",
"url": "https://bugzilla.suse.com/1203389"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203424",
"url": "https://bugzilla.suse.com/1203424"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203622",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "self",
"summary": "SUSE Bug 1203737",
"url": "https://bugzilla.suse.com/1203737"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203770",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "self",
"summary": "SUSE Bug 1203802",
"url": "https://bugzilla.suse.com/1203802"
},
{
"category": "self",
"summary": "SUSE Bug 1203906",
"url": "https://bugzilla.suse.com/1203906"
},
{
"category": "self",
"summary": "SUSE Bug 1203909",
"url": "https://bugzilla.suse.com/1203909"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203939",
"url": "https://bugzilla.suse.com/1203939"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE Bug 1204051",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "self",
"summary": "SUSE Bug 1204059",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "self",
"summary": "SUSE Bug 1204060",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "self",
"summary": "SUSE Bug 1204125",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16119 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27784 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20369 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26373 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2905 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2977 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3028 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39190 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41222 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-31T08:28:31Z",
"generator": {
"date": "2022-10-31T08:28:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3809-1",
"initial_release_date": "2022-10-31T08:28:31Z",
"revision_history": [
{
"date": "2022-10-31T08:28:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-150300.106.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-150300.106.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-150300.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-150300.106.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-150300.106.1.noarch",
"product_id": "kernel-source-rt-5.3.18-150300.106.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt-optional-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP3",
"product": {
"name": "SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-150300.106.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-150300.106.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-150300.106.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-150300.106.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2020-16119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16119"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16119",
"url": "https://www.suse.com/security/cve/CVE-2020-16119"
},
{
"category": "external",
"summary": "SUSE Bug 1177471 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "external",
"summary": "SUSE Bug 1177742 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2020-16119"
},
{
"cve": "CVE-2020-27784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27784"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27784",
"url": "https://www.suse.com/security/cve/CVE-2020-27784"
},
{
"category": "external",
"summary": "SUSE Bug 1202895 for CVE-2020-27784",
"url": "https://bugzilla.suse.com/1202895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-27784"
},
{
"cve": "CVE-2021-4155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4155"
}
],
"notes": [
{
"category": "general",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4155",
"url": "https://www.suse.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "SUSE Bug 1194272 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1194272"
},
{
"category": "external",
"summary": "SUSE Bug 1199255 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1199255"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-4203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4203"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4203",
"url": "https://www.suse.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "SUSE Bug 1194535 for CVE-2021-4203",
"url": "https://bugzilla.suse.com/1194535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20369"
}
],
"notes": [
{
"category": "general",
"text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20369",
"url": "https://www.suse.com/security/cve/CVE-2022-20369"
},
{
"category": "external",
"summary": "SUSE Bug 1202347 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "external",
"summary": "SUSE Bug 1212321 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1212321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-26373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26373"
}
],
"notes": [
{
"category": "general",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26373",
"url": "https://www.suse.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "SUSE Bug 1201726 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "external",
"summary": "SUSE Bug 1209619 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1209619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2905"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2905",
"url": "https://www.suse.com/security/cve/CVE-2022-2905"
},
{
"category": "external",
"summary": "SUSE Bug 1202860 for CVE-2022-2905",
"url": "https://bugzilla.suse.com/1202860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2977"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2977",
"url": "https://www.suse.com/security/cve/CVE-2022-2977"
},
{
"category": "external",
"summary": "SUSE Bug 1202672 for CVE-2022-2977",
"url": "https://bugzilla.suse.com/1202672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-3028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3028"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3028",
"url": "https://www.suse.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "SUSE Bug 1202898 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "external",
"summary": "SUSE Bug 1212296 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1212296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-32296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32296"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32296",
"url": "https://www.suse.com/security/cve/CVE-2022-32296"
},
{
"category": "external",
"summary": "SUSE Bug 1200288 for CVE-2022-32296",
"url": "https://bugzilla.suse.com/1200288"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-36879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36879"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36879",
"url": "https://www.suse.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "SUSE Bug 1201948 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "external",
"summary": "SUSE Bug 1212327 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1212327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39190"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39190",
"url": "https://www.suse.com/security/cve/CVE-2022-39190"
},
{
"category": "external",
"summary": "SUSE Bug 1203117 for CVE-2022-39190",
"url": "https://bugzilla.suse.com/1203117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41222"
}
],
"notes": [
{
"category": "general",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41222",
"url": "https://www.suse.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "SUSE Bug 1203622 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "external",
"summary": "SUSE Bug 1203624 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1209476 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:28:31Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
}
]
}
SUSE-SU-2023:0416-1
Vulnerability from csaf_suse - Published: 2023-02-15 09:48 - Updated: 2023-02-15 09:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-13695: Fixed fix acpi operand cache leak in nseval.c (bsc#1055710).\n- CVE-2018-7755: Fixed bypass of kernel security protections such as KASLR using fd_locked_ioctl function in drivers/block/floppy.c (bnc#1084513).\n- CVE-2019-3837: Fixed memory leak due to thread-unsafe implementation of the net_dma code in tcp_recvmsg() (bnc#1131430).\n- CVE-2019-3900: Fixed infinite loop while receiving packets in vhost_net (bnc#1133374).\n- CVE-2020-15393: Fixed memory leak in usbtest_disconnect in drivers/usb/misc/usbtest.c (bnc#1173514).\n- CVE-2020-16119: Fixed use-after-free exploitable by a local attacker due to reuse of a DCCP socket (bnc#1177471).\n- CVE-2020-36557: Fixed race condition in the VT_DISALLOCATE ioctl and closing/opening of ttys which could lead to a use-after-free (bnc#1201429).\n- CVE-2020-36558: Fixed race condition in VT_RESIZEX (bsc#1200910).\n- CVE-2021-26341: Fixed vulnerablity where some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bnc#1201050).\n- CVE-2021-33655: When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds (bnc#1201635).\n- CVE-2021-33656: Fixed memory out of bounds write when setting font with malicous data by ioctl cmd PIO_FONT (bnc#1201636).\n- CVE-2021-34981: Fixed file refcounter in bluetooth cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-39713: Fixed race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1196973).\n- CVE-2021-45868: Fixed use-after-free in fs/quota/quota_tree.c (bnc#1197366).\n- CVE-2022-1011: Fixed UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (bsc#1197343).\n- CVE-2022-1048: Fixed potential AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).\n- CVE-2022-1353: Fixed denial of service in the pfkey_register function in net/key/af_key.c (bnc#1198516).\n- CVE-2022-1462: Fixed out-of-bounds read in the TeleTYpe subsystem allowing local user to crash the system or read unauthorized random data from memory (bnc#1198829).\n- CVE-2022-1652: Fixed use after free in floppy (bsc#1199063).\n- CVE-2022-1679: Fixed use-after-free in the atheros wireless adapter driver (bnc#1199487).\n- CVE-2022-20132: Fixed out of bounds read in lg_probe and related functions of hid-lg.c and other USB HID files (bnc#1200619).\n- CVE-2022-20166: Fixed out of bounds write due to a heap buffer overflow which could lead to local escalation of privilege with System execution privileges needed (bnc#1200598).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bnc#1202346).\n- CVE-2022-20369: Fixed out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-21166, CVE-2022-21127, CVE-2022-21123, CVE-2022-21125, CVE-2022-21180: Fixed stale MMIO data transient information leaks (INTEL-TA-00615) (bnc#1199650).\n- CVE-2022-21385: Fixed warn in rds_message_alloc_sgs (bnc#1202897).\n- CVE-2022-21499: Fixed issue where it was trivial to break out of lockdown using kgdb (bsc#1199426).\n- CVE-2022-2318: Fixed use-after-free caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges (bnc#1201251).\n- CVE-2022-2663: Fixed possible firewall bypass when users are using unencrypted IRC due to message handling confusion in nf_conntrack_irc (bnc#1202097).\n- CVE-2022-28356: Fixed refcount leak bug in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-29900: Fixed mis-trained branch predictions for return instructions that may have allowed arbitrary speculative code execution under certain microarchitecture-dependent conditions (bnc#1199657).\n- CVE-2022-29901: Fixed vulnerability where an attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions (bnc#1199657).\n- CVE-2022-3028: Fixed a race condition in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bnc#1202898).\n- CVE-2022-3303: Fixed race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-33981: Fixed denial of service in drivers/block/floppy.c (bnc#1200692).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option leading to kernel panic (bnc#1204166).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options of the component IPv6 Handler (bnc#1204354).\n- CVE-2022-3565: Fixed use-after-free in del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth (bnc#1204431).\n- CVE-2022-3566: Fixed race condition in the TCP Handler (bnc#1204405).\n- CVE-2022-3586: Fixed use-after-free in the sch_sfb enqueue function (bnc#1204439).\n- CVE-2022-3621: Fixed null pointer dereference in fs/nilfs2/inode.c of the component nilfs2 (bnc#1204574).\n- CVE-2022-3635: Fixed use-after-free in IPsec (bnc#1204631).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF (bnc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode of the file fs/nilfs2/inode.c (bnc#1204647).\n- CVE-2022-36879: Fixed double refcount drop in xfrm_expand_policies in net/xfrm/xfrm_policy.c (bnc#1201948).\n- CVE-2022-36946: Fixed denial of service in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940).\n- CVE-2022-3903: Fixed incorrect read request flaw in the Infrared Transceiver USB driver (bnc#1205220).\n- CVE-2022-39188: Fixed TLB flush for PFNMAP mappings before unlink_file_vma() (bsc#1203107).\n- CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c (bnc#1203514).\n- CVE-2022-4095: Fixed use-after-free in rtl8712 (bsc#1205514).\n- CVE-2022-41218: Fixed use-after-free in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-41848: Fixed use-after-free in drivers/char/pcmcia/synclink_cs.c (bnc#1203987).\n- CVE-2022-41850: Fixed use-after-free in roccat_report_event in drivers/hid/hid-roccat.c (bnc#1203960).\n- CVE-2022-41858: Fixed NULL pointer dereference in drivers/net/slip/slip.c (bnc#1205671).\n- CVE-2022-43750: Fixed memory corruption in drivers/usb/mon/mon_bin.c (bnc#1204653).\n- CVE-2022-44032: Fixed race condition in drivers/char/pcmcia/cm4000_cs.c (bnc#1204894).\n- CVE-2022-44033: Fixed use-after-free in drivers/char/pcmcia/cm4040_cs.c (bnc#1204922).\n- CVE-2022-45934: Fixed integer wraparound in net/bluetooth/l2cap_core.c (bnc#1205796).\n\nThe following non-security bugs were fixed:\n\n- Fail if no bound addresses can be used for a given scope (bsc#1206677).\n- Fixed missing check on handle in net_sched cls_route (bsc#1202393).\n- Trim skb to alloc size to avoid MSG_TRUNC (bsc#1166098).\n- Fixed confusing boot logging with Skylake on RETBLEED kernel (bsc#1202500).\n- Fixed retbleed performance issues (bsc#1203271).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-416,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-416",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0416-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0416-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230416-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0416-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html"
},
{
"category": "self",
"summary": "SUSE Bug 1055710",
"url": "https://bugzilla.suse.com/1055710"
},
{
"category": "self",
"summary": "SUSE Bug 1084513",
"url": "https://bugzilla.suse.com/1084513"
},
{
"category": "self",
"summary": "SUSE Bug 1131430",
"url": "https://bugzilla.suse.com/1131430"
},
{
"category": "self",
"summary": "SUSE Bug 1133374",
"url": "https://bugzilla.suse.com/1133374"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1166098",
"url": "https://bugzilla.suse.com/1166098"
},
{
"category": "self",
"summary": "SUSE Bug 1173514",
"url": "https://bugzilla.suse.com/1173514"
},
{
"category": "self",
"summary": "SUSE Bug 1177471",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1196973",
"url": "https://bugzilla.suse.com/1196973"
},
{
"category": "self",
"summary": "SUSE Bug 1197331",
"url": "https://bugzilla.suse.com/1197331"
},
{
"category": "self",
"summary": "SUSE Bug 1197343",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "self",
"summary": "SUSE Bug 1197366",
"url": "https://bugzilla.suse.com/1197366"
},
{
"category": "self",
"summary": "SUSE Bug 1197391",
"url": "https://bugzilla.suse.com/1197391"
},
{
"category": "self",
"summary": "SUSE Bug 1198516",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "self",
"summary": "SUSE Bug 1198829",
"url": "https://bugzilla.suse.com/1198829"
},
{
"category": "self",
"summary": "SUSE Bug 1199063",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "self",
"summary": "SUSE Bug 1199426",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199650",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200598",
"url": "https://bugzilla.suse.com/1200598"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200910",
"url": "https://bugzilla.suse.com/1200910"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201251",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "self",
"summary": "SUSE Bug 1201429",
"url": "https://bugzilla.suse.com/1201429"
},
{
"category": "self",
"summary": "SUSE Bug 1201635",
"url": "https://bugzilla.suse.com/1201635"
},
{
"category": "self",
"summary": "SUSE Bug 1201636",
"url": "https://bugzilla.suse.com/1201636"
},
{
"category": "self",
"summary": "SUSE Bug 1201940",
"url": "https://bugzilla.suse.com/1201940"
},
{
"category": "self",
"summary": "SUSE Bug 1201948",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1202347",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "self",
"summary": "SUSE Bug 1202393",
"url": "https://bugzilla.suse.com/1202393"
},
{
"category": "self",
"summary": "SUSE Bug 1202500",
"url": "https://bugzilla.suse.com/1202500"
},
{
"category": "self",
"summary": "SUSE Bug 1202897",
"url": "https://bugzilla.suse.com/1202897"
},
{
"category": "self",
"summary": "SUSE Bug 1202898",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203271",
"url": "https://bugzilla.suse.com/1203271"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203960",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE Bug 1204354",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "self",
"summary": "SUSE Bug 1204405",
"url": "https://bugzilla.suse.com/1204405"
},
{
"category": "self",
"summary": "SUSE Bug 1204431",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "self",
"summary": "SUSE Bug 1204439",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "self",
"summary": "SUSE Bug 1204574",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "self",
"summary": "SUSE Bug 1204631",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "self",
"summary": "SUSE Bug 1204646",
"url": "https://bugzilla.suse.com/1204646"
},
{
"category": "self",
"summary": "SUSE Bug 1204647",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "self",
"summary": "SUSE Bug 1204653",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "self",
"summary": "SUSE Bug 1204894",
"url": "https://bugzilla.suse.com/1204894"
},
{
"category": "self",
"summary": "SUSE Bug 1204922",
"url": "https://bugzilla.suse.com/1204922"
},
{
"category": "self",
"summary": "SUSE Bug 1205220",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "self",
"summary": "SUSE Bug 1205514",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "self",
"summary": "SUSE Bug 1205671",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "self",
"summary": "SUSE Bug 1205796",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "self",
"summary": "SUSE Bug 1206677",
"url": "https://bugzilla.suse.com/1206677"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13695 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7755 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3837 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3900 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15393 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16119 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36557 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36557/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39713 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45868 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1011 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1048 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1353 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1462 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1652 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20369 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21127 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21180 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21385 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21499 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28356 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3028 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3565 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3566 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3635 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3649 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36946 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3903 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4095 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41858 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43750 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44032 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44033 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-02-15T09:48:18Z",
"generator": {
"date": "2023-02-15T09:48:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0416-1",
"initial_release_date": "2023-02-15T09:48:18Z",
"revision_history": [
{
"date": "2023-02-15T09:48:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-debug-3.0.101-108.138.1.i586",
"product_id": "kernel-debug-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-debug-base-3.0.101-108.138.1.i586",
"product_id": "kernel-debug-base-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-debug-devel-3.0.101-108.138.1.i586",
"product_id": "kernel-debug-devel-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-debug-extra-3.0.101-108.138.1.i586",
"product_id": "kernel-debug-extra-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-hmac-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-debug-hmac-3.0.101-108.138.1.i586",
"product_id": "kernel-debug-hmac-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.138.1.i586",
"product_id": "kernel-default-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.138.1.i586",
"product_id": "kernel-default-base-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.138.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-default-extra-3.0.101-108.138.1.i586",
"product_id": "kernel-default-extra-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-hmac-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-default-hmac-3.0.101-108.138.1.i586",
"product_id": "kernel-default-hmac-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.138.1.i586",
"product_id": "kernel-ec2-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.138.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.138.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-ec2-extra-3.0.101-108.138.1.i586",
"product_id": "kernel-ec2-extra-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-hmac-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-ec2-hmac-3.0.101-108.138.1.i586",
"product_id": "kernel-ec2-hmac-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.138.1.i586",
"product_id": "kernel-pae-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.138.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.138.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-extra-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-pae-extra-3.0.101-108.138.1.i586",
"product_id": "kernel-pae-extra-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-hmac-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-pae-hmac-3.0.101-108.138.1.i586",
"product_id": "kernel-pae-hmac-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.138.1.i586",
"product_id": "kernel-source-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.138.1.i586",
"product_id": "kernel-source-vanilla-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.138.1.i586",
"product_id": "kernel-syms-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.138.1.i586",
"product_id": "kernel-trace-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.138.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.138.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-extra-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-trace-extra-3.0.101-108.138.1.i586",
"product_id": "kernel-trace-extra-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-hmac-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-trace-hmac-3.0.101-108.138.1.i586",
"product_id": "kernel-trace-hmac-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-vanilla-3.0.101-108.138.1.i586",
"product_id": "kernel-vanilla-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-vanilla-base-3.0.101-108.138.1.i586",
"product_id": "kernel-vanilla-base-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-vanilla-devel-3.0.101-108.138.1.i586",
"product_id": "kernel-vanilla-devel-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-hmac-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-vanilla-hmac-3.0.101-108.138.1.i586",
"product_id": "kernel-vanilla-hmac-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.138.1.i586",
"product_id": "kernel-xen-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.138.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.138.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-xen-extra-3.0.101-108.138.1.i586",
"product_id": "kernel-xen-extra-3.0.101-108.138.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-hmac-3.0.101-108.138.1.i586",
"product": {
"name": "kernel-xen-hmac-3.0.101-108.138.1.i586",
"product_id": "kernel-xen-hmac-3.0.101-108.138.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.138.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.138.1.ia64",
"product_id": "kernel-source-3.0.101-108.138.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.138.1.ia64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.138.1.ia64",
"product_id": "kernel-source-vanilla-3.0.101-108.138.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.138.1.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.138.1.noarch",
"product_id": "kernel-docs-3.0.101-108.138.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.138.1.ppc",
"product": {
"name": "kernel-source-3.0.101-108.138.1.ppc",
"product_id": "kernel-source-3.0.101-108.138.1.ppc"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.138.1.ppc",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.138.1.ppc",
"product_id": "kernel-source-vanilla-3.0.101-108.138.1.ppc"
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.138.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.138.1.ppc64",
"product_id": "kernel-source-3.0.101-108.138.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.138.1.ppc64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.138.1.ppc64",
"product_id": "kernel-source-vanilla-3.0.101-108.138.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.138.1.s390",
"product": {
"name": "kernel-source-3.0.101-108.138.1.s390",
"product_id": "kernel-source-3.0.101-108.138.1.s390"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.138.1.s390",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.138.1.s390",
"product_id": "kernel-source-vanilla-3.0.101-108.138.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.138.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.138.1.s390x",
"product_id": "kernel-source-3.0.101-108.138.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.138.1.s390x",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.138.1.s390x",
"product_id": "kernel-source-vanilla-3.0.101-108.138.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-debug-3.0.101-108.138.1.x86_64",
"product_id": "kernel-debug-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-debug-base-3.0.101-108.138.1.x86_64",
"product_id": "kernel-debug-base-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-debug-devel-3.0.101-108.138.1.x86_64",
"product_id": "kernel-debug-devel-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-debug-extra-3.0.101-108.138.1.x86_64",
"product_id": "kernel-debug-extra-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-hmac-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-debug-hmac-3.0.101-108.138.1.x86_64",
"product_id": "kernel-debug-hmac-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.138.1.x86_64",
"product_id": "kernel-default-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.138.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.138.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-default-extra-3.0.101-108.138.1.x86_64",
"product_id": "kernel-default-extra-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-hmac-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-default-hmac-3.0.101-108.138.1.x86_64",
"product_id": "kernel-default-hmac-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.138.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.138.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.0.101-108.138.1.x86_64",
"product_id": "kernel-ec2-extra-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-hmac-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-ec2-hmac-3.0.101-108.138.1.x86_64",
"product_id": "kernel-ec2-hmac-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.138.1.x86_64",
"product_id": "kernel-source-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.138.1.x86_64",
"product_id": "kernel-source-vanilla-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.138.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.138.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.138.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.138.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-extra-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-trace-extra-3.0.101-108.138.1.x86_64",
"product_id": "kernel-trace-extra-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-hmac-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-trace-hmac-3.0.101-108.138.1.x86_64",
"product_id": "kernel-trace-hmac-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-vanilla-3.0.101-108.138.1.x86_64",
"product_id": "kernel-vanilla-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-vanilla-base-3.0.101-108.138.1.x86_64",
"product_id": "kernel-vanilla-base-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-3.0.101-108.138.1.x86_64",
"product_id": "kernel-vanilla-devel-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-hmac-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-vanilla-hmac-3.0.101-108.138.1.x86_64",
"product_id": "kernel-vanilla-hmac-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.138.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.138.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.138.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-xen-extra-3.0.101-108.138.1.x86_64",
"product_id": "kernel-xen-extra-3.0.101-108.138.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-hmac-3.0.101-108.138.1.x86_64",
"product": {
"name": "kernel-xen-hmac-3.0.101-108.138.1.x86_64",
"product_id": "kernel-xen-hmac-3.0.101-108.138.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.138.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.138.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13695"
}
],
"notes": [
{
"category": "general",
"text": "The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13695",
"url": "https://www.suse.com/security/cve/CVE-2017-13695"
},
{
"category": "external",
"summary": "SUSE Bug 1055710 for CVE-2017-13695",
"url": "https://bugzilla.suse.com/1055710"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-13695",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "low"
}
],
"title": "CVE-2017-13695"
},
{
"cve": "CVE-2018-7755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7755"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7755",
"url": "https://www.suse.com/security/cve/CVE-2018-7755"
},
{
"category": "external",
"summary": "SUSE Bug 1084513 for CVE-2018-7755",
"url": "https://bugzilla.suse.com/1084513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "low"
}
],
"title": "CVE-2018-7755"
},
{
"cve": "CVE-2019-3837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3837"
}
],
"notes": [
{
"category": "general",
"text": "It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3837",
"url": "https://www.suse.com/security/cve/CVE-2019-3837"
},
{
"category": "external",
"summary": "SUSE Bug 1131430 for CVE-2019-3837",
"url": "https://bugzilla.suse.com/1131430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2019-3837"
},
{
"cve": "CVE-2019-3900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3900"
}
],
"notes": [
{
"category": "general",
"text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3900",
"url": "https://www.suse.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "SUSE Bug 1133374 for CVE-2019-3900",
"url": "https://bugzilla.suse.com/1133374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "low"
}
],
"title": "CVE-2019-3900"
},
{
"cve": "CVE-2020-15393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15393"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15393",
"url": "https://www.suse.com/security/cve/CVE-2020-15393"
},
{
"category": "external",
"summary": "SUSE Bug 1173514 for CVE-2020-15393",
"url": "https://bugzilla.suse.com/1173514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2020-15393"
},
{
"cve": "CVE-2020-16119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16119"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16119",
"url": "https://www.suse.com/security/cve/CVE-2020-16119"
},
{
"category": "external",
"summary": "SUSE Bug 1177471 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "external",
"summary": "SUSE Bug 1177742 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2020-16119"
},
{
"cve": "CVE-2020-36557",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36557"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36557",
"url": "https://www.suse.com/security/cve/CVE-2020-36557"
},
{
"category": "external",
"summary": "SUSE Bug 1201429 for CVE-2020-36557",
"url": "https://bugzilla.suse.com/1201429"
},
{
"category": "external",
"summary": "SUSE Bug 1201742 for CVE-2020-36557",
"url": "https://bugzilla.suse.com/1201742"
},
{
"category": "external",
"summary": "SUSE Bug 1202874 for CVE-2020-36557",
"url": "https://bugzilla.suse.com/1202874"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2020-36557",
"url": "https://bugzilla.suse.com/1205313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36558"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36558",
"url": "https://www.suse.com/security/cve/CVE-2020-36558"
},
{
"category": "external",
"summary": "SUSE Bug 1200910 for CVE-2020-36558",
"url": "https://bugzilla.suse.com/1200910"
},
{
"category": "external",
"summary": "SUSE Bug 1201752 for CVE-2020-36558",
"url": "https://bugzilla.suse.com/1201752"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2020-36558",
"url": "https://bugzilla.suse.com/1205313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1191580 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1191580"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-33655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33655"
}
],
"notes": [
{
"category": "general",
"text": "When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33655",
"url": "https://www.suse.com/security/cve/CVE-2021-33655"
},
{
"category": "external",
"summary": "SUSE Bug 1201635 for CVE-2021-33655",
"url": "https://bugzilla.suse.com/1201635"
},
{
"category": "external",
"summary": "SUSE Bug 1202087 for CVE-2021-33655",
"url": "https://bugzilla.suse.com/1202087"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2021-33655",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1212291 for CVE-2021-33655",
"url": "https://bugzilla.suse.com/1212291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33656"
}
],
"notes": [
{
"category": "general",
"text": "When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33656",
"url": "https://www.suse.com/security/cve/CVE-2021-33656"
},
{
"category": "external",
"summary": "SUSE Bug 1201636 for CVE-2021-33656",
"url": "https://bugzilla.suse.com/1201636"
},
{
"category": "external",
"summary": "SUSE Bug 1212286 for CVE-2021-33656",
"url": "https://bugzilla.suse.com/1212286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-39713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39713"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-173788806References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39713",
"url": "https://www.suse.com/security/cve/CVE-2021-39713"
},
{
"category": "external",
"summary": "SUSE Bug 1196973 for CVE-2021-39713",
"url": "https://bugzilla.suse.com/1196973"
},
{
"category": "external",
"summary": "SUSE Bug 1197211 for CVE-2021-39713",
"url": "https://bugzilla.suse.com/1197211"
},
{
"category": "external",
"summary": "SUSE Bug 1201790 for CVE-2021-39713",
"url": "https://bugzilla.suse.com/1201790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2021-39713"
},
{
"cve": "CVE-2021-45868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45868"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45868",
"url": "https://www.suse.com/security/cve/CVE-2021-45868"
},
{
"category": "external",
"summary": "SUSE Bug 1197366 for CVE-2021-45868",
"url": "https://bugzilla.suse.com/1197366"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-45868"
},
{
"cve": "CVE-2022-1011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1011"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1011",
"url": "https://www.suse.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "SUSE Bug 1197343 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "external",
"summary": "SUSE Bug 1197344 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197344"
},
{
"category": "external",
"summary": "SUSE Bug 1198687 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212322 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1212322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1048"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1048",
"url": "https://www.suse.com/security/cve/CVE-2022-1048"
},
{
"category": "external",
"summary": "SUSE Bug 1197331 for CVE-2022-1048",
"url": "https://bugzilla.suse.com/1197331"
},
{
"category": "external",
"summary": "SUSE Bug 1197597 for CVE-2022-1048",
"url": "https://bugzilla.suse.com/1197597"
},
{
"category": "external",
"summary": "SUSE Bug 1200041 for CVE-2022-1048",
"url": "https://bugzilla.suse.com/1200041"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1048",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212325 for CVE-2022-1048",
"url": "https://bugzilla.suse.com/1212325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-1048"
},
{
"cve": "CVE-2022-1353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1353"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1353",
"url": "https://www.suse.com/security/cve/CVE-2022-1353"
},
{
"category": "external",
"summary": "SUSE Bug 1198516 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "external",
"summary": "SUSE Bug 1212293 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1212293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1462"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1462",
"url": "https://www.suse.com/security/cve/CVE-2022-1462"
},
{
"category": "external",
"summary": "SUSE Bug 1198829 for CVE-2022-1462",
"url": "https://bugzilla.suse.com/1198829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1652"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1652",
"url": "https://www.suse.com/security/cve/CVE-2022-1652"
},
{
"category": "external",
"summary": "SUSE Bug 1199063 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "external",
"summary": "SUSE Bug 1200057 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200057"
},
{
"category": "external",
"summary": "SUSE Bug 1200751 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200751"
},
{
"category": "external",
"summary": "SUSE Bug 1201034 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201034"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212307 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1212307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20166"
}
],
"notes": [
{
"category": "general",
"text": "In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20166",
"url": "https://www.suse.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "SUSE Bug 1200598 for CVE-2022-20166",
"url": "https://bugzilla.suse.com/1200598"
},
{
"category": "external",
"summary": "SUSE Bug 1212284 for CVE-2022-20166",
"url": "https://bugzilla.suse.com/1212284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20369"
}
],
"notes": [
{
"category": "general",
"text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20369",
"url": "https://www.suse.com/security/cve/CVE-2022-20369"
},
{
"category": "external",
"summary": "SUSE Bug 1202347 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "external",
"summary": "SUSE Bug 1212321 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1212321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-21123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21123"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21123",
"url": "https://www.suse.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209075 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1209075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21125"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21125",
"url": "https://www.suse.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209074 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1209074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21127"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21127",
"url": "https://www.suse.com/security/cve/CVE-2022-21127"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1200549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21166"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21166",
"url": "https://www.suse.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209073 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1209073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21180"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21180",
"url": "https://www.suse.com/security/cve/CVE-2022-21180"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1212313 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1212313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-21180"
},
{
"cve": "CVE-2022-21385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21385"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21385",
"url": "https://www.suse.com/security/cve/CVE-2022-21385"
},
{
"category": "external",
"summary": "SUSE Bug 1202897 for CVE-2022-21385",
"url": "https://bugzilla.suse.com/1202897"
},
{
"category": "external",
"summary": "SUSE Bug 1212285 for CVE-2022-21385",
"url": "https://bugzilla.suse.com/1212285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21499"
}
],
"notes": [
{
"category": "general",
"text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21499",
"url": "https://www.suse.com/security/cve/CVE-2022-21499"
},
{
"category": "external",
"summary": "SUSE Bug 1199426 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "external",
"summary": "SUSE Bug 1200059 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1200059"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1203034"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212315 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1212315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2318"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2318",
"url": "https://www.suse.com/security/cve/CVE-2022-2318"
},
{
"category": "external",
"summary": "SUSE Bug 1201251 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "external",
"summary": "SUSE Bug 1212303 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1212303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-28356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28356",
"url": "https://www.suse.com/security/cve/CVE-2022-28356"
},
{
"category": "external",
"summary": "SUSE Bug 1197391 for CVE-2022-28356",
"url": "https://bugzilla.suse.com/1197391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-28356"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-3028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3028"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3028",
"url": "https://www.suse.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "SUSE Bug 1202898 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "external",
"summary": "SUSE Bug 1212296 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1212296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-3524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3524"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3524",
"url": "https://www.suse.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "SUSE Bug 1204354 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1204354"
},
{
"category": "external",
"summary": "SUSE Bug 1212320 for CVE-2022-3524",
"url": "https://bugzilla.suse.com/1212320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3565"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3565",
"url": "https://www.suse.com/security/cve/CVE-2022-3565"
},
{
"category": "external",
"summary": "SUSE Bug 1204431 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204431"
},
{
"category": "external",
"summary": "SUSE Bug 1204432 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1204432"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212323 for CVE-2022-3565",
"url": "https://bugzilla.suse.com/1212323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3566"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3566",
"url": "https://www.suse.com/security/cve/CVE-2022-3566"
},
{
"category": "external",
"summary": "SUSE Bug 1204405 for CVE-2022-3566",
"url": "https://bugzilla.suse.com/1204405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3621"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3621",
"url": "https://www.suse.com/security/cve/CVE-2022-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1204574 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1204574"
},
{
"category": "external",
"summary": "SUSE Bug 1212295 for CVE-2022-3621",
"url": "https://bugzilla.suse.com/1212295"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3635"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3635",
"url": "https://www.suse.com/security/cve/CVE-2022-3635"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1204631 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204631"
},
{
"category": "external",
"summary": "SUSE Bug 1204636 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1204636"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212289 for CVE-2022-3635",
"url": "https://bugzilla.suse.com/1212289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3646"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3646",
"url": "https://www.suse.com/security/cve/CVE-2022-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1204646 for CVE-2022-3646",
"url": "https://bugzilla.suse.com/1204646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "low"
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3649"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3649",
"url": "https://www.suse.com/security/cve/CVE-2022-3649"
},
{
"category": "external",
"summary": "SUSE Bug 1204647 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1204647"
},
{
"category": "external",
"summary": "SUSE Bug 1212318 for CVE-2022-3649",
"url": "https://bugzilla.suse.com/1212318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "low"
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36879"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36879",
"url": "https://www.suse.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "SUSE Bug 1201948 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "external",
"summary": "SUSE Bug 1212327 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1212327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36946"
}
],
"notes": [
{
"category": "general",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36946",
"url": "https://www.suse.com/security/cve/CVE-2022-36946"
},
{
"category": "external",
"summary": "SUSE Bug 1201940 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1201940"
},
{
"category": "external",
"summary": "SUSE Bug 1201941 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1201941"
},
{
"category": "external",
"summary": "SUSE Bug 1202312 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1202312"
},
{
"category": "external",
"summary": "SUSE Bug 1202874 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1202874"
},
{
"category": "external",
"summary": "SUSE Bug 1203208 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1203208"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1212310 for CVE-2022-36946",
"url": "https://bugzilla.suse.com/1212310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3903"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3903",
"url": "https://www.suse.com/security/cve/CVE-2022-3903"
},
{
"category": "external",
"summary": "SUSE Bug 1205220 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1205220"
},
{
"category": "external",
"summary": "SUSE Bug 1212297 for CVE-2022-3903",
"url": "https://bugzilla.suse.com/1212297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-4095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4095"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4095",
"url": "https://www.suse.com/security/cve/CVE-2022-4095"
},
{
"category": "external",
"summary": "SUSE Bug 1205514 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205514"
},
{
"category": "external",
"summary": "SUSE Bug 1205594 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1205594"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1212319 for CVE-2022-4095",
"url": "https://bugzilla.suse.com/1212319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41850"
}
],
"notes": [
{
"category": "general",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41850",
"url": "https://www.suse.com/security/cve/CVE-2022-41850"
},
{
"category": "external",
"summary": "SUSE Bug 1203960 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1203960"
},
{
"category": "external",
"summary": "SUSE Bug 1212314 for CVE-2022-41850",
"url": "https://bugzilla.suse.com/1212314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41858"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41858",
"url": "https://www.suse.com/security/cve/CVE-2022-41858"
},
{
"category": "external",
"summary": "SUSE Bug 1205671 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1205671"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212300 for CVE-2022-41858",
"url": "https://bugzilla.suse.com/1212300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-43750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43750"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43750",
"url": "https://www.suse.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "SUSE Bug 1204653 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1204653"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-43750",
"url": "https://bugzilla.suse.com/1211484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-44032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44032"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44032",
"url": "https://www.suse.com/security/cve/CVE-2022-44032"
},
{
"category": "external",
"summary": "SUSE Bug 1204894 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1204894"
},
{
"category": "external",
"summary": "SUSE Bug 1212290 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1212290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-44032"
},
{
"cve": "CVE-2022-44033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44033"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44033",
"url": "https://www.suse.com/security/cve/CVE-2022-44033"
},
{
"category": "external",
"summary": "SUSE Bug 1204922 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1204922"
},
{
"category": "external",
"summary": "SUSE Bug 1212306 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1212306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-44033"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.138.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.138.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T09:48:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
}
]
}
SUSE-SU-2022:4577-1
Vulnerability from csaf_suse - Published: 2022-12-19 19:05 - Updated: 2022-12-19 19:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 31 for SLE 15)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150000_150_95 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4577,SUSE-SLE-Live-Patching-12-SP4-2022-4548,SUSE-SLE-Live-Patching-12-SP5-2022-4578,SUSE-SLE-Module-Live-Patching-15-2022-4553,SUSE-SLE-Module-Live-Patching-15-2022-4554,SUSE-SLE-Module-Live-Patching-15-2022-4576,SUSE-SLE-Module-Live-Patching-15-2022-4577",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4577-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4577-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224577-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4577-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 31 for SLE 15)",
"tracking": {
"current_release_date": "2022-12-19T19:05:42Z",
"generator": {
"date": "2022-12-19T19:05:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4577-1",
"initial_release_date": "2022-12-19T19:05:42Z",
"revision_history": [
{
"date": "2022-12-19T19:05:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_89-default-10-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-7-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_95-default-5-150000.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_98-default-5-150000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T19:05:42Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4543-1
Vulnerability from csaf_suse - Published: 2022-12-17 23:34 - Updated: 2022-12-17 23:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_87 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4543,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4543",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4543-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4543-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224543-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4543-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T23:34:04Z",
"generator": {
"date": "2022-12-17T23:34:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4543-1",
"initial_release_date": "2022-12-17T23:34:04Z",
"revision_history": [
{
"date": "2022-12-17T23:34:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-preempt-7-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-preempt-7-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-preempt-7-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-7-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T23:34:04Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4520-1
Vulnerability from csaf_suse - Published: 2022-12-17 11:04 - Updated: 2022-12-17 11:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-197_108 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4520,SUSE-SLE-Live-Patching-12-SP5-2022-4520,SUSE-SLE-Live-Patching-12-SP5-2022-4522,SUSE-SLE-Live-Patching-12-SP5-2022-4525,SUSE-SLE-Live-Patching-12-SP5-2022-4526,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4521,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4523,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4524",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4520-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4520-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224520-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4520-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2022-12-17T11:04:44Z",
"generator": {
"date": "2022-12-17T11:04:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4520-1",
"initial_release_date": "2022-12-17T11:04:44Z",
"revision_history": [
{
"date": "2022-12-17T11:04:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-16-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_105-default-12-150100.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-11-150100.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T11:04:44Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3704-1
Vulnerability from csaf_suse - Published: 2022-10-24 13:10 - Updated: 2022-10-24 13:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP2 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)\n- CVE-2022-20008: Fixed a bug which allowed to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. (bnc#1199564)\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).\n- CVE-2022-32296: Fixed a bug which allowed TCP servers to identify clients by observing what source ports are used (bnc#1200288).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).\n- CVE-2022-42719: Fixed remote code execution with wlan frames when parsing a multi-BSSID element (bsc#1204051).\n- CVE-2022-42720: Fixed remote code execution due to refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Fixed remote code execution due list corruption in the wlan stack (bsc#1204060).\n\nThe following non-security bugs were fixed:\n\n- net: mana: Add support of XDP_REDIRECT action (bsc#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bsc#1201309, jsc#PED-529).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3704,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3704,SUSE-SLE-Product-HA-15-SP2-2022-3704,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3704,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3704,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3704,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3704,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3704,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3704,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3704,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3704,SUSE-Storage-7-2022-3704",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3704-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3704-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223704-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3704-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html"
},
{
"category": "self",
"summary": "SUSE Bug 1177471",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "self",
"summary": "SUSE Bug 1199564",
"url": "https://bugzilla.suse.com/1199564"
},
{
"category": "self",
"summary": "SUSE Bug 1200288",
"url": "https://bugzilla.suse.com/1200288"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203622",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203770",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE Bug 1204051",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "self",
"summary": "SUSE Bug 1204059",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "self",
"summary": "SUSE Bug 1204060",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16119 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20008 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41222 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-24T13:10:58Z",
"generator": {
"date": "2022-10-24T13:10:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3704-1",
"initial_release_date": "2022-10-24T13:10:58Z",
"revision_history": [
{
"date": "2022-10-24T13:10:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-default-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"product_id": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.134.1.aarch64",
"product_id": "kernel-syms-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.134.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.134.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"product_id": "kernel-devel-5.3.18-150200.24.134.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"product_id": "kernel-docs-5.3.18-150200.24.134.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150200.24.134.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150200.24.134.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150200.24.134.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"product_id": "kernel-macros-5.3.18-150200.24.134.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150200.24.134.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch",
"product_id": "kernel-source-5.3.18-150200.24.134.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150200.24.134.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150200.24.134.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150200.24.134.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-default-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-default-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"product_id": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-syms-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150200.24.134.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-debug-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-default-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"product_id": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_134-preempt-1-150200.5.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_134-preempt-1-150200.5.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_134-preempt-1-150200.5.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"product_id": "kernel-syms-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.134.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.134.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.134.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.134.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.134.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.134.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.134.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.134.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.134.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16119"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16119",
"url": "https://www.suse.com/security/cve/CVE-2020-16119"
},
{
"category": "external",
"summary": "SUSE Bug 1177471 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177471"
},
{
"category": "external",
"summary": "SUSE Bug 1177742 for CVE-2020-16119",
"url": "https://bugzilla.suse.com/1177742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2020-16119"
},
{
"cve": "CVE-2022-20008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20008"
}
],
"notes": [
{
"category": "general",
"text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20008",
"url": "https://www.suse.com/security/cve/CVE-2022-20008"
},
{
"category": "external",
"summary": "SUSE Bug 1199564 for CVE-2022-20008",
"url": "https://bugzilla.suse.com/1199564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-20008"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-32296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32296"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32296",
"url": "https://www.suse.com/security/cve/CVE-2022-32296"
},
{
"category": "external",
"summary": "SUSE Bug 1200288 for CVE-2022-32296",
"url": "https://bugzilla.suse.com/1200288"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41222"
}
],
"notes": [
{
"category": "general",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41222",
"url": "https://www.suse.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "SUSE Bug 1203622 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203622"
},
{
"category": "external",
"summary": "SUSE Bug 1203624 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1203624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1209476 for CVE-2022-41222",
"url": "https://bugzilla.suse.com/1209476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_134-default-1-150200.5.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.134.1.150200.9.63.2.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.134.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.134.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.134.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-24T13:10:58Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
}
]
}
SUSE-SU-2022:3693-1
Vulnerability from csaf_suse - Published: 2022-10-22 09:58 - Updated: 2022-10-22 09:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-20008: Fixed local information disclosure due to possibility to read kernel heap memory via mmc_blk_read_single of block.c (bnc#1199564).\n- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).\n- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bnc#1200288).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-41848: Fixed a race condition in drivers/char/pcmcia/synclink_cs.c mgslpc_ioctl and mgslpc_detach (bnc#1203987).\n\nThe following non-security bugs were fixed:\n\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add the Linux MANA PF driver (bnc#1201309, jsc#PED-529).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3693,SUSE-SLE-Module-Live-Patching-15-SP1-2022-3693,SUSE-SLE-Product-HA-15-SP1-2022-3693,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3693,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3693,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3693,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3693,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3693,SUSE-Storage-6-2022-3693,openSUSE-SLE-15.3-2022-3693,openSUSE-SLE-15.4-2022-3693",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3693-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3693-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223693-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3693-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html"
},
{
"category": "self",
"summary": "SUSE Bug 1199564",
"url": "https://bugzilla.suse.com/1199564"
},
{
"category": "self",
"summary": "SUSE Bug 1200288",
"url": "https://bugzilla.suse.com/1200288"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20008 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-22T09:58:42Z",
"generator": {
"date": "2022-10-22T09:58:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3693-1",
"initial_release_date": "2022-10-22T09:58:42Z",
"revision_history": [
{
"date": "2022-10-22T09:58:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-default-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-syms-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"product_id": "kernel-devel-4.12.14-150100.197.126.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"product_id": "kernel-docs-4.12.14-150100.197.126.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150100.197.126.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150100.197.126.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150100.197.126.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"product_id": "kernel-macros-4.12.14-150100.197.126.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150100.197.126.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150100.197.126.1.noarch",
"product_id": "kernel-source-4.12.14-150100.197.126.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150100.197.126.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150100.197.126.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150100.197.126.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-default-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-default-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-default-base-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-default-man-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-syms-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-debug-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-default-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-syms-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.126.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.126.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.126.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.126.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.126.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.126.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.126.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.126.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-20008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20008"
}
],
"notes": [
{
"category": "general",
"text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20008",
"url": "https://www.suse.com/security/cve/CVE-2022-20008"
},
{
"category": "external",
"summary": "SUSE Bug 1199564 for CVE-2022-20008",
"url": "https://bugzilla.suse.com/1199564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-22T09:58:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-20008"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-22T09:58:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-32296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32296"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32296",
"url": "https://www.suse.com/security/cve/CVE-2022-32296"
},
{
"category": "external",
"summary": "SUSE Bug 1200288 for CVE-2022-32296",
"url": "https://bugzilla.suse.com/1200288"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-22T09:58:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-22T09:58:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-22T09:58:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-22T09:58:42Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_126-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.126.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.126.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-22T09:58:42Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
}
]
}
SUSE-SU-2022:3810-1
Vulnerability from csaf_suse - Published: 2022-10-31 08:30 - Updated: 2022-10-31 08:30Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel rt was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory. (bnc#1203514)\n- CVE-2022-3169: Fixed a denial of service flaw which occurs when consecutive requests to NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET are sent. (bnc#1203290)\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n- CVE-2022-20008: Fixed a bug which allowed to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. (bnc#1199564)\n- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c. (bnc#1203322)\n- CVE-2022-3424: Fixed a use-after-free in gru_set_context_option which was leading to kernel panic. (bsc#1204166)\n\nThe following non-security bugs were fixed:\n\n- ACPI: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bnc#1203802).\n- ACPI: processor_idle: Skip dummy wait if kernel is in guest (bnc#1203802).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- cifs: alloc_mid function should be marked as static (bsc#1190317).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1190317).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1190317).\n- cifs: check for smb1 in open_cached_dir() (bsc#1190317).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1190317).\n- cifs: clean up an inconsistent indenting (bsc#1190317).\n- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1190317).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1190317).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1190317).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1190317).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1190317).\n- cifs: fix handlecache and multiuser (bsc#1190317).\n- cifs: fix lock length calculation (bsc#1190317).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1190317).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1190317).\n- cifs: fix NULL ptr dereference in smb2_ioctl_query_info() (bsc#1190317).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1190317).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1190317).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1190317).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1190317).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1190317).\n- cifs: mark sessions for reconnection in helper function (bsc#1190317).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1190317).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1190317).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1190317).\n- cifs: move superblock magic defitions to magic.h (bsc#1190317).\n- cifs: potential buffer overflow in handling symlinks (bsc#1190317).\n- cifs: prevent bad output lengths in smb2_ioctl_query_info() (bsc#1190317).\n- cifs: release cached dentries only if mount is complete (bsc#1190317).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1190317).\n- cifs: remove check of list iterator against head past the loop body (bsc#1190317).\n- cifs: remove minor build warning (bsc#1190317).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1190317).\n- cifs: remove remaining build warnings (bsc#1190317).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1190317).\n- cifs: remove some camelCase and also some static build warnings (bsc#1190317).\n- cifs: remove unnecessary (void*) conversions (bsc#1190317).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1190317).\n- cifs: remove useless DeleteMidQEntry() (bsc#1190317).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1190317).\n- cifs: return errors during session setup during reconnects (bsc#1190317).\n- cifs: return the more nuanced writeback error on close() (bsc#1190317).\n- cifs: sanitize multiple delimiters in prepath (bsc#1190317).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1190317).\n- cifs: skip trailing separators of prefix paths (bsc#1190317).\n- cifs: smbd: fix typo in comment (bsc#1190317).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1190317).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1190317).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1190317).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1190317).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1190317).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1190317).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1190317).\n- dm: thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1203462).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (bsc#1154048)\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- Input: iforce - constify usb_device_id and fix space before \u0027[\u0027 error (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: stop telling users to snail-mail Vojtech (git-fixes).\n- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).\n- locking/csd_lock: Change csdlock_debug from early_param to __setup (git-fixes).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).\n- NFSv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- powerpc: Use device_type helpers to access the node type (bsc#1203424 ltc#199544).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203254 LTC#199911).\n- s390/guarded storage: simplify task exit handling (bsc#1203254 LTC#199911).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203142 LTC#199883).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (bsc#1203198 LTC#199898).\n- scsi: ch: Make it possible to open a ch device multiple times again (git-fixes).\n- scsi: core: Avoid that a kernel warning appears during system resume (git-fixes).\n- scsi: core: Avoid that system resume triggers a kernel warning (git-fixes).\n- scsi: fcoe: Embed fc_rport_priv in fcoe_rport structure (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (git-fixes).\n- scsi: lpfc: Check the return value of alloc_workqueue() (git-fixes).\n- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (git-fixes).\n- scsi: mpt3sas: Fix ioctl timeout (git-fixes).\n- scsi: mpt3sas: Fix sync irqs (git-fixes).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (git-fixes).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sd_zbc: Fix compilation warning (git-fixes).\n- scsi: sd: enable compat ioctls for sed-opal (git-fixes).\n- scsi: sd: Fix Opal support (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1190317).\n- smb3: add trace point for SMB2_set_eof (bsc#1190317).\n- smb3: check for null tcon (bsc#1190317).\n- smb3: check xattr value length earlier (bsc#1190317).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1190317).\n- smb3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1190317).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- sysfb: Enable boot time VESA graphic mode selection (bsc#1129770) Backporting notes: \t* context changes \t* config update\n- USB: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- USB: serial: ftdi_sio: add Belimo device ids (git-fixes).\n- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support.\n- USB: serial: option: add Quectel RM520N (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- USB: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: Fix memory leak in usbnet_disconnect() (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (bsc#1154048) Backporting notes: \t* context changes\n- video: fbdev: arkfb: Check the size of screen before memset_io() (bsc#1154048)\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (bsc#1154048)\n- video: fbdev: s3fb: Check the size of screen before memset_io() (bsc#1154048)\n- video: fbdev: sis: fix typos in SiS_GetModeID() (bsc#1154048)\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (bsc#1154048)\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xhci: bail out early if driver can\u0027t accress host in resume (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3810,SUSE-SLE-RT-12-SP5-2022-3810",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3810-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3810-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223810-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3810-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html"
},
{
"category": "self",
"summary": "SUSE Bug 1032323",
"url": "https://bugzilla.suse.com/1032323"
},
{
"category": "self",
"summary": "SUSE Bug 1124235",
"url": "https://bugzilla.suse.com/1124235"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1154048",
"url": "https://bugzilla.suse.com/1154048"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1199564",
"url": "https://bugzilla.suse.com/1199564"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203142",
"url": "https://bugzilla.suse.com/1203142"
},
{
"category": "self",
"summary": "SUSE Bug 1203198",
"url": "https://bugzilla.suse.com/1203198"
},
{
"category": "self",
"summary": "SUSE Bug 1203254",
"url": "https://bugzilla.suse.com/1203254"
},
{
"category": "self",
"summary": "SUSE Bug 1203290",
"url": "https://bugzilla.suse.com/1203290"
},
{
"category": "self",
"summary": "SUSE Bug 1203322",
"url": "https://bugzilla.suse.com/1203322"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203424",
"url": "https://bugzilla.suse.com/1203424"
},
{
"category": "self",
"summary": "SUSE Bug 1203462",
"url": "https://bugzilla.suse.com/1203462"
},
{
"category": "self",
"summary": "SUSE Bug 1203514",
"url": "https://bugzilla.suse.com/1203514"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203802",
"url": "https://bugzilla.suse.com/1203802"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1204166",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20008 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-31T08:30:34Z",
"generator": {
"date": "2022-10-31T08:30:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3810-1",
"initial_release_date": "2022-10-31T08:30:34Z",
"revision_history": [
{
"date": "2022-10-31T08:30:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.103.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.103.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.103.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.103.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.103.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.103.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.103.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.103.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.103.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.103.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.103.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.103.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.103.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.103.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.103.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-20008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20008"
}
],
"notes": [
{
"category": "general",
"text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20008",
"url": "https://www.suse.com/security/cve/CVE-2022-20008"
},
{
"category": "external",
"summary": "SUSE Bug 1199564 for CVE-2022-20008",
"url": "https://bugzilla.suse.com/1199564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-20008"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3169"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3169",
"url": "https://www.suse.com/security/cve/CVE-2022-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1203290 for CVE-2022-3169",
"url": "https://bugzilla.suse.com/1203290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "important"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-40307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40307"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40307",
"url": "https://www.suse.com/security/cve/CVE-2022-40307"
},
{
"category": "external",
"summary": "SUSE Bug 1203322 for CVE-2022-40307",
"url": "https://bugzilla.suse.com/1203322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40768"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40768",
"url": "https://www.suse.com/security/cve/CVE-2022-40768"
},
{
"category": "external",
"summary": "SUSE Bug 1203514 for CVE-2022-40768",
"url": "https://bugzilla.suse.com/1203514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.103.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.103.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-31T08:30:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
}
]
}
SUSE-SU-2022:4595-1
Vulnerability from csaf_suse - Published: 2022-12-20 16:06 - Updated: 2022-12-20 16:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-95_93 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4595,SUSE-SLE-Live-Patching-12-SP4-2022-4595",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4595-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4595-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224595-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4595-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP4)",
"tracking": {
"current_release_date": "2022-12-20T16:06:11Z",
"generator": {
"date": "2022-12-20T16:06:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4595-1",
"initial_release_date": "2022-12-20T16:06:11Z",
"revision_history": [
{
"date": "2022-12-20T16:06:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T16:06:11Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4516-1
Vulnerability from csaf_suse - Published: 2022-12-16 21:06 - Updated: 2022-12-16 21:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_93 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4516,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4516",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4516-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4516-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224516-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4516-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-16T21:06:18Z",
"generator": {
"date": "2022-12-16T21:06:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4516-1",
"initial_release_date": "2022-12-16T21:06:18Z",
"revision_history": [
{
"date": "2022-12-16T21:06:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_93-preempt-5-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_93-preempt-5-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_93-preempt-5-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-5-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T21:06:18Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4580-1
Vulnerability from csaf_suse - Published: 2022-12-20 09:04 - Updated: 2022-12-20 09:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150200_24_112 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4580,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4580",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4580-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4580-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224580-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4580-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2022-12-20T09:04:52Z",
"generator": {
"date": "2022-12-20T09:04:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4580-1",
"initial_release_date": "2022-12-20T09:04:52Z",
"revision_history": [
{
"date": "2022-12-20T09:04:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_112-preempt-11-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_112-preempt-11-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_112-preempt-11-150200.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-11-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T09:04:52Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4562-1
Vulnerability from csaf_suse - Published: 2022-12-19 16:34 - Updated: 2022-12-19 16:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-59_37 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4562,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4555,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4562,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4563,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4564,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4570,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4571",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4562-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4562-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224562-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4562-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-19T16:34:10Z",
"generator": {
"date": "2022-12-19T16:34:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4562-1",
"initial_release_date": "2022-12-19T16:34:10Z",
"revision_history": [
{
"date": "2022-12-19T16:34:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_43-preempt-17-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_43-preempt-17-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_43-preempt-17-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-17-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-15-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-19-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-18-150300.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-18-150300.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T16:34:10Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3585-1
Vulnerability from csaf_suse - Published: 2022-10-14 07:52 - Updated: 2022-10-14 07:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).\n- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bnc#1198189).\n- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bnc#1203389).\n- CVE-2022-39189: Fixed a bug in the x86 KVM subsystem which allows unprivileged guest users to compromise the guest kernel because TLB flush operations are mishandled (bnc#1203066).\n\nThe following non-security bugs were fixed:\n\n- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).\n- ACPI: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bsc#1203767).\n- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).\n- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).\n- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: core: Fix double-free at snd_card_new() (git-fixes).\n- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).\n- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).\n- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).\n- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).\n- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).\n- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).\n- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).\n- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).\n- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).\n- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).\n- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).\n- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).\n- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).\n- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).\n- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).\n- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).\n- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).\n- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).\n- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).\n- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).\n- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).\n- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).\n- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).\n- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).\n- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).\n- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).\n- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).\n- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).\n- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).\n- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).\n- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).\n- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).\n- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).\n- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).\n- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).\n- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).\n- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).\n- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).\n- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).\n- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).\n- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).\n- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).\n- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).\n- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).\n- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).\n- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).\n- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).\n- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).\n- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).\n- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).\n- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).\n- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).\n- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).\n- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).\n- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).\n- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).\n- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).\n- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).\n- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).\n- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).\n- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).\n- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).\n- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).\n- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).\n- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- ALSA: hda/tegra: set depop delay for tegra (git-fixes).\n- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).\n- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).\n- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).\n- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).\n- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes).\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).\n- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: lib: Import latest version of Arm Optimized Routines\u0027 strcmp (git-fixes)\n- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)\n- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).\n- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).\n- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).\n- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).\n- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).\n- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).\n- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).\n- ASoC: cs35l41: Binding fixes (bsc#1203699).\n- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).\n- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).\n- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).\n- ASoC: cs35l41: Correct DSP power down (bsc#1203699).\n- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).\n- ASoC: cs35l41: Correct some control names (bsc#1203699).\n- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).\n- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).\n- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).\n- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).\n- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).\n- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).\n- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).\n- ASoC: cs35l41: DSP Support (bsc#1203699).\n- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).\n- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).\n- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).\n- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).\n- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).\n- ASoC: cs35l41: Fix link problem (bsc#1203699).\n- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).\n- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).\n- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).\n- ASoC: cs35l41: Fixup the error messages (bsc#1203699).\n- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).\n- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).\n- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).\n- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).\n- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).\n- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).\n- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).\n- ASoC: cs35l41: Support external boost (bsc#1203699).\n- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).\n- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).\n- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).\n- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).\n- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).\n- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).\n- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).\n- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).\n- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).\n- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).\n- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).\n- ASoC: cs42l42: Handle system suspend (bsc#1203699).\n- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).\n- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).\n- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).\n- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).\n- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).\n- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).\n- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).\n- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).\n- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).\n- ASoC: cs42l42: Report initial jack state (bsc#1203699).\n- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).\n- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).\n- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).\n- ASoC: cs42l42: Use PLL for SCLK \u003e 12.288MHz (bsc#1203699).\n- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).\n- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).\n- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).\n- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).\n- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).\n- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- ASoC: qcom: sm8250: add missing module owner (git-fixes).\n- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).\n- ASoC: tas2770: Reinit regcache on reset (git-fixes).\n- ASoC: wm_adsp: Add support for \u0027toggle\u0027 preloaders (bsc#1203699).\n- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).\n- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).\n- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).\n- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).\n- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).\n- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).\n- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).\n- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).\n- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).\n- ASoC: wm_adsp: Move check for control existence (bsc#1203699).\n- ASoC: wm_adsp: Move check of dsp-\u003erunning to better place (bsc#1203699).\n- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).\n- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).\n- ASoC: wm_adsp: remove a repeated including (bsc#1203699).\n- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).\n- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).\n- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).\n- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).\n- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).\n- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).\n- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).\n- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).\n- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).\n- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol \u0027ret\u0027 (bsc#1203699).\n- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).\n- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).\n- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).\n- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).\n- bnx2x: fix built-in kernel driver load failure (git-fixes).\n- bnx2x: fix driver load from initrd (git-fixes).\n- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).\n- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).\n- build mlx in x86_64/azure as modules again (bsc#1203701) There is little gain by having the drivers built into the kernel. Having them as modules allows easy replacement by third party drivers.\n- can: gs_usb: gs_can_open(): fix race dev-\u003ecan.state condition (git-fixes).\n- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).\n- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).\n- cgroup: Fix threadgroup_rwsem \u0026lt;-\u003e cpus_read_lock() deadlock (bsc#1196869).\n- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).\n- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)\n- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).\n- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).\n- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).\n- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).\n- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).\n- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).\n- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).\n- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).\n- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).\n- dmaengine: idxd: int handle management refactoring (jsc#PED-682).\n- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).\n- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).\n- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).\n- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).\n- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).\n- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).\n- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).\n- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).\n- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).\n- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amd/display: Mark dml30\u0027s UseMinimumDCFCLK() as noinline for stack usage (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateFlipSchedule() (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).\n- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: make sure to init common IP before gmc (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).\n- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).\n- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).\n- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).\n- drm/bridge: lt8912b: add vsync hsync (git-fixes).\n- drm/bridge: lt8912b: fix corrupted image output (git-fixes).\n- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).\n- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).\n- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).\n- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).\n- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).\n- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).\n- dt-bindings: hwmon: (mr75203) fix \u0027intel,vm-map\u0027 property to be optional (git-fixes).\n- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- efi: libstub: Disable struct randomization (git-fixes).\n- eth: alx: take rtnl_lock on resume (git-fixes).\n- eth: sun: cassini: remove dead code (git-fixes).\n- explicit set MODULE_SIG_HASH in azure config (bsc#1203933) Setting this option became mandatory in Feb 2022. While the lack of this option did not cause issues with automated builds, a manual osc build started to fail due to incorrect macro expansion.\n- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: \t* context fixes in other patch \t* update config\n- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).\n- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).\n- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).\n- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).\n- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).\n- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).\n- firmware: cs_dsp: Add pre_run callback (bsc#1203699).\n- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).\n- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).\n- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).\n- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).\n- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).\n- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).\n- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).\n- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).\n- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).\n- firmware: cs_dsp: Print messages from bin files (bsc#1203699).\n- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203798).\n- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).\n- gpio: mockup: remove gpio debugfs when remove device (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).\n- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).\n- hwmon: (mr75203) enable polling for all VM channels (git-fixes).\n- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).\n- hwmon: (mr75203) fix VM sensor allocation when \u0027intel,vm-map\u0027 not defined (git-fixes).\n- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).\n- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).\n- hwmon: (tps23861) fix byte order in resistance register (git-fixes).\n- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).\n- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).\n- i2c: mlxbf: Fix frequency calculation (git-fixes).\n- i2c: mlxbf: incorrect base address passed during io write (git-fixes).\n- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).\n- i2c: mlxbf: support lock mechanism (git-fixes).\n- ice: Allow operation with reduced device MSI-X (bsc#1201987).\n- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).\n- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).\n- ice: fix crash when writing timestamp on RX rings (git-fixes).\n- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).\n- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).\n- ice: Fix race during aux device (un)plugging (git-fixes).\n- ice: Match on all profiles in slow-path (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- igb: skip phy status check where unavailable (git-fixes).\n- Input: goodix - add compatible string for GT1158 (git-fixes).\n- Input: goodix - add support for GT1158 (git-fixes).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iqs62x-keys - drop unused device node references (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- kABI workaround for spi changes (bsc#1203699).\n- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).\n- kABI: fix adding another field to scsi_device (bsc#1203039).\n- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).\n- kbuild: disable header exports for UML in a straightforward way (git-fixes).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).\n- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: VMX: Heed the \u0027msr\u0027 argument in msr_write_intercepted() (git-fixes).\n- KVM: X86: Fix when shadow_root_level=5 \u0026\u0026 guest root_level\u0026lt;4 (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_send_ipi() (git-fixes).\n- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).\n- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- lockd: detect and reject lock arguments that overflow (git-fixes).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).\n- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).\n- media: flexcop-usb: fix endpoint type check (git-fixes).\n- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Correct some definition according specification (git-fixes).\n- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).\n- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).\n- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).\n- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).\n- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).\n- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.\n- media: rkvdec: Disable H.264 error detection (git-fixes).\n- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).\n- media: vsp1: Fix offset calculation for plane cropping.\n- misc: cs35l41: Remove unused pdn variable (bsc#1203699).\n- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).\n- mlxsw: i2c: Fix initialization error flow (git-fixes).\n- mm: Fix PASID use-after-free issue (bsc#1203908).\n- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).\n- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).\n- net: axienet: fix RX ring refill allocation failure handling (git-fixes).\n- net: axienet: reset core on initialization prior to MDIO access (git-fixes).\n- net: bcmgenet: hide status block before TX timestamping (git-fixes).\n- net: bcmgenet: Revert \u0027Use stronger register read/writes to assure ordering\u0027 (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).\n- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).\n- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).\n- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).\n- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).\n- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).\n- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).\n- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).\n- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).\n- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).\n- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).\n- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).\n- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).\n- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).\n- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).\n- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).\n- net: ftgmac100: access hardware register after clock ready (git-fixes).\n- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).\n- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).\n- net: ipa: get rid of a duplicate initialization (git-fixes).\n- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).\n- net: ipa: record proper RX transaction count (git-fixes).\n- net: macb: Fix PTP one step sync support (git-fixes).\n- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).\n- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).\n- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).\n- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).\n- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).\n- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).\n- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).\n- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).\n- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).\n- net: phy: at803x: move page selection fix to config_init (git-fixes).\n- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).\n- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).\n- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).\n- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).\n- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).\n- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).\n- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).\n- net: stmmac: only enable DMA interrupts when ready (git-fixes).\n- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).\n- net: stmmac: remove unused get_addr() callback (git-fixes).\n- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).\n- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).\n- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: wwan: iosm: Call mutex_init before locking it (git-fixes).\n- net: wwan: iosm: remove pointless null check (git-fixes).\n- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).\n- net/mlx5: Drain fw_reset when removing device (git-fixes).\n- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).\n- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).\n- net/mlx5e: Remove HW-GRO from reported features (git-fixes).\n- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).\n- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).\n- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).\n- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFS: fix problems with __nfs42_ssc_open (git-fixes).\n- NFS: Fix races in the legacy idmapper upcall (git-fixes).\n- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).\n- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFS: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).\n- NFS: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).\n- NFSD: Clean up the show_nf_flags() macro (git-fixes).\n- NFSD: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).\n- of: device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1152489)\n- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)\n- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)\n- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)\n- PCI: Correct misspelled words (git-fixes).\n- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).\n- PCI: Prefer \u0027unsigned int\u0027 over bare \u0027unsigned\u0027 (git-fixes).\n- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).\n- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).\n- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).\n- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).\n- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).\n- pNFS/flexfiles: Report RDMA connection errors to the server (git-fixes).\n- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Define static symbols (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).\n- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Fix spelling mistake \u0027definiton\u0027 -\u003e \u0027definition\u0027 (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: Revert \u0027scsi: qla2xxx: Fix disk failure to rediscover\u0027 (git-fixes).\n- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).\n- selftests: forwarding: add shebang for sch_red.sh (git-fixes).\n- selftests: forwarding: Fix failing tests with old libnet (git-fixes).\n- serial: atmel: remove redundant assignment in rs485_config (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: fsl_lpuart: Reset prior to registration (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- spi: Add API to count spi acpi resources (bsc#1203699).\n- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).\n- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).\n- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).\n- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).\n- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).\n- spi: Return deferred probe error when controller isn\u0027t yet available (bsc#1203699).\n- spi: s3c64xx: Fix large transfers with DMA (git-fixes).\n- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).\n- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).\n- struct ehci_hcd: hide new element going into a hole (git-fixes).\n- struct xhci_hcd: restore member now dynamically allocated (git-fixes).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: fix expiry of auth creds (git-fixes).\n- SUNRPC: Fix xdr_encode_bool() (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).\n- USB: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: Drop commas after SoC match table sentinels (git-fixes).\n- USB: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).\n- USB: dwc3: disable USB core PHY management (git-fixes).\n- USB: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- USB: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).\n- USB: dwc3: gadget: Refactor pullup() (git-fixes).\n- USB: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).\n- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).\n- USB: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).\n- USB: host: xhci: use ffs() in xhci_mem_init() (git-fixes).\n- USB: hub: avoid warm port reset during USB3 disconnect (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add Quectel RM520N (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- USB: storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).\n- USB: typec: tipd: Add an additional overflow check (git-fixes).\n- USB: typec: tipd: Do not read/write more bytes than required (git-fixes).\n- USB: typec: ucsi: Remove incorrect warning (git-fixes).\n- USB: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- vfio/type1: Unpin zero pages (git-fixes).\n- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).\n- video: fbdev: i740fb: Error out if \u0027pixclock\u0027 equals zero (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).\n- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).\n- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).\n- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).\n- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).\n- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).\n- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).\n- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).\n- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).\n- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).\n- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).\n- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).\n- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).\n- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).\n- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).\n- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).\n- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).\n- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).\n- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).\n- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).\n- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen-blkback: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkback: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkback: fix persistent grants negotiation (git-fixes).\n- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkfront: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).\n- xen-blkfront: Handle NULL gendisk (git-fixes).\n- xen-netback: only remove \u0027hotplug-status\u0027 when the vif is actually destroyed (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).\n- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).\n- xhci: Allocate separate command structures for each LPM command (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3585,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3585,openSUSE-SLE-15.4-2022-3585",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3585-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3585-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223585-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3585-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1190497",
"url": "https://bugzilla.suse.com/1190497"
},
{
"category": "self",
"summary": "SUSE Bug 1194023",
"url": "https://bugzilla.suse.com/1194023"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1195917",
"url": "https://bugzilla.suse.com/1195917"
},
{
"category": "self",
"summary": "SUSE Bug 1196444",
"url": "https://bugzilla.suse.com/1196444"
},
{
"category": "self",
"summary": "SUSE Bug 1196869",
"url": "https://bugzilla.suse.com/1196869"
},
{
"category": "self",
"summary": "SUSE Bug 1197659",
"url": "https://bugzilla.suse.com/1197659"
},
{
"category": "self",
"summary": "SUSE Bug 1198189",
"url": "https://bugzilla.suse.com/1198189"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1201987",
"url": "https://bugzilla.suse.com/1201987"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203039",
"url": "https://bugzilla.suse.com/1203039"
},
{
"category": "self",
"summary": "SUSE Bug 1203066",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "self",
"summary": "SUSE Bug 1203101",
"url": "https://bugzilla.suse.com/1203101"
},
{
"category": "self",
"summary": "SUSE Bug 1203197",
"url": "https://bugzilla.suse.com/1203197"
},
{
"category": "self",
"summary": "SUSE Bug 1203263",
"url": "https://bugzilla.suse.com/1203263"
},
{
"category": "self",
"summary": "SUSE Bug 1203338",
"url": "https://bugzilla.suse.com/1203338"
},
{
"category": "self",
"summary": "SUSE Bug 1203360",
"url": "https://bugzilla.suse.com/1203360"
},
{
"category": "self",
"summary": "SUSE Bug 1203361",
"url": "https://bugzilla.suse.com/1203361"
},
{
"category": "self",
"summary": "SUSE Bug 1203389",
"url": "https://bugzilla.suse.com/1203389"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203505",
"url": "https://bugzilla.suse.com/1203505"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203664",
"url": "https://bugzilla.suse.com/1203664"
},
{
"category": "self",
"summary": "SUSE Bug 1203693",
"url": "https://bugzilla.suse.com/1203693"
},
{
"category": "self",
"summary": "SUSE Bug 1203699",
"url": "https://bugzilla.suse.com/1203699"
},
{
"category": "self",
"summary": "SUSE Bug 1203701",
"url": "https://bugzilla.suse.com/1203701"
},
{
"category": "self",
"summary": "SUSE Bug 1203767",
"url": "https://bugzilla.suse.com/1203767"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203794",
"url": "https://bugzilla.suse.com/1203794"
},
{
"category": "self",
"summary": "SUSE Bug 1203798",
"url": "https://bugzilla.suse.com/1203798"
},
{
"category": "self",
"summary": "SUSE Bug 1203893",
"url": "https://bugzilla.suse.com/1203893"
},
{
"category": "self",
"summary": "SUSE Bug 1203902",
"url": "https://bugzilla.suse.com/1203902"
},
{
"category": "self",
"summary": "SUSE Bug 1203906",
"url": "https://bugzilla.suse.com/1203906"
},
{
"category": "self",
"summary": "SUSE Bug 1203908",
"url": "https://bugzilla.suse.com/1203908"
},
{
"category": "self",
"summary": "SUSE Bug 1203933",
"url": "https://bugzilla.suse.com/1203933"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203939",
"url": "https://bugzilla.suse.com/1203939"
},
{
"category": "self",
"summary": "SUSE Bug 1203969",
"url": "https://bugzilla.suse.com/1203969"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1263 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3202 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39189 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-14T07:52:29Z",
"generator": {
"date": "2022-10-14T07:52:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3585-1",
"initial_release_date": "2022-10-14T07:52:29Z",
"revision_history": [
{
"date": "2022-10-14T07:52:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "kernel-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "kernel-azure-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"product_id": "kernel-azure-devel-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"product_id": "kernel-azure-extra-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"product_id": "kernel-azure-optional-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "kernel-syms-azure-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"product_id": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"product": {
"name": "kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"product_id": "kernel-devel-azure-5.14.21-150400.14.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"product": {
"name": "kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"product_id": "kernel-source-azure-5.14.21-150400.14.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "kernel-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "kernel-azure-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"product_id": "kernel-azure-devel-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"product_id": "kernel-azure-extra-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"product_id": "kernel-azure-optional-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "kernel-syms-azure-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.16.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150400.14.16.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150400.14.16.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150400.14.16.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150400.14.16.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1263"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1263",
"url": "https://www.suse.com/security/cve/CVE-2022-1263"
},
{
"category": "external",
"summary": "SUSE Bug 1198189 for CVE-2022-1263",
"url": "https://bugzilla.suse.com/1198189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-1263"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-3202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3202"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3202",
"url": "https://www.suse.com/security/cve/CVE-2022-3202"
},
{
"category": "external",
"summary": "SUSE Bug 1203389 for CVE-2022-3202",
"url": "https://bugzilla.suse.com/1203389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-3202"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-39189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39189"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39189",
"url": "https://www.suse.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "SUSE Bug 1203066 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "external",
"summary": "SUSE Bug 1203067 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "important"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.16.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.16.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
}
]
}
SUSE-SU-2022:4534-1
Vulnerability from csaf_suse - Published: 2022-12-17 18:05 - Updated: 2022-12-17 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_71 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4534,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4531,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4534",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4534-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4534-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224534-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4534-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-17T18:05:08Z",
"generator": {
"date": "2022-12-17T18:05:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4534-1",
"initial_release_date": "2022-12-17T18:05:08Z",
"revision_history": [
{
"date": "2022-12-17T18:05:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_71-preempt-9-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_71-preempt-9-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_71-preempt-9-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-3-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-9-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-17T18:05:08Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4550-1
Vulnerability from csaf_suse - Published: 2022-12-19 17:05 - Updated: 2022-12-19 17:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 26 for SLE 15)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150_78 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4550,SUSE-SLE-Live-Patching-12-SP4-2022-4549,SUSE-SLE-Live-Patching-12-SP4-2022-4550,SUSE-SLE-Live-Patching-12-SP5-2022-4557,SUSE-SLE-Module-Live-Patching-15-2022-4552,SUSE-SLE-Module-Live-Patching-15-2022-4558,SUSE-SLE-Module-Live-Patching-15-2022-4575",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4550-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4550-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224550-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4550-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 26 for SLE 15)",
"tracking": {
"current_release_date": "2022-12-19T17:05:39Z",
"generator": {
"date": "2022-12-19T17:05:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4550-1",
"initial_release_date": "2022-12-19T17:05:39Z",
"revision_history": [
{
"date": "2022-12-19T17:05:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_83-default-16-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_88-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_98-default-17-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-16-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-12-150000.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-11-150000.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T17:05:39Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3688-1
Vulnerability from csaf_suse - Published: 2022-10-21 12:12 - Updated: 2022-10-21 12:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n\nThe following non-security bugs were fixed:\n\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3688,SUSE-SLE-Module-Live-Patching-15-2022-3688,SUSE-SLE-Product-HA-15-2022-3688,SUSE-SLE-Product-HPC-15-2022-3688,SUSE-SLE-Product-SLES-15-2022-3688,SUSE-SLE-Product-SLES_SAP-15-2022-3688",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3688-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3688-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223688-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3688-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-21T12:12:43Z",
"generator": {
"date": "2022-10-21T12:12:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3688-1",
"initial_release_date": "2022-10-21T12:12:43Z",
"revision_history": [
{
"date": "2022-10-21T12:12:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-default-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-syms-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150000.150.104.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150000.150.104.1.noarch",
"product_id": "kernel-devel-4.12.14-150000.150.104.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150000.150.104.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150000.150.104.1.noarch",
"product_id": "kernel-docs-4.12.14-150000.150.104.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150000.150.104.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150000.150.104.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150000.150.104.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150000.150.104.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150000.150.104.1.noarch",
"product_id": "kernel-macros-4.12.14-150000.150.104.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150000.150.104.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150000.150.104.1.noarch",
"product_id": "kernel-source-4.12.14-150000.150.104.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150000.150.104.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150000.150.104.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150000.150.104.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-default-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-default-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-default-base-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-default-man-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-syms-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150000.150.104.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-debug-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-default-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-syms-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.104.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:12:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:12:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:12:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:12:43Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_104-default-1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.104.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.104.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.104.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:12:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
}
]
}
SUSE-SU-2022:3586-1
Vulnerability from csaf_suse - Published: 2022-10-14 07:54 - Updated: 2022-10-14 07:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n- CVE-2022-39188: Fixed a race condition where a device driver can free a page while it still has stale TLB entries. (bnc#1203107).\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bnc#1202097).\n\nThe following non-security bugs were fixed:\n\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3586,SUSE-OpenStack-Cloud-9-2022-3586,SUSE-OpenStack-Cloud-Crowbar-9-2022-3586,SUSE-SLE-HA-12-SP4-2022-3586,SUSE-SLE-Live-Patching-12-SP4-2022-3586,SUSE-SLE-SAP-12-SP4-2022-3586,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3586",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3586-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3586-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223586-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3586-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-14T07:54:18Z",
"generator": {
"date": "2022-10-14T07:54:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3586-1",
"initial_release_date": "2022-10-14T07:54:18Z",
"revision_history": [
{
"date": "2022-10-14T07:54:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.111.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.111.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.111.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.111.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.111.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.111.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.111.1.aarch64",
"product_id": "kernel-default-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.111.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.111.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.111.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.111.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.111.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.111.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.111.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.111.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.111.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.111.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.111.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.111.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.111.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.111.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.111.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.111.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.111.1.noarch",
"product_id": "kernel-devel-4.12.14-95.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.111.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.111.1.noarch",
"product_id": "kernel-docs-4.12.14-95.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.111.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.111.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.111.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.111.1.noarch",
"product_id": "kernel-macros-4.12.14-95.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.111.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.111.1.noarch",
"product_id": "kernel-source-4.12.14-95.111.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.111.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.111.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.111.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.111.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.111.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.111.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.111.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.111.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.111.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.111.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.111.1.s390x",
"product_id": "kernel-default-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.111.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.111.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.111.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.111.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.111.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.111.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.111.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.111.1.s390x",
"product_id": "kernel-syms-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.111.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.111.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.111.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.111.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.111.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.111.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.111.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.111.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.111.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.111.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.111.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.111.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.111.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.111.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.111.1.x86_64",
"product_id": "kernel-default-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.111.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.111.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.111.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.111.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.111.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.111.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.111.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.111.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.111.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.111.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.111.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.111.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.111.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.111.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.111.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.111.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.111.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.111.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.111.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.111.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.111.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.111.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.111.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.111.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.111.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.111.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:54:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:54:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:54:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:54:18Z",
"details": "important"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.111.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.111.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.111.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:54:18Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
}
]
}
SUSE-SU-2022:3584-1
Vulnerability from csaf_suse - Published: 2022-10-14 07:52 - Updated: 2022-10-14 07:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).\n- CVE-2022-20008: Fixed a bug which allowed to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. (bnc#1199564)\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bnc#1202097).\n- CVE-2022-39188: Fixed a race condition where a device driver can free a page while it still has stale TLB entries. (bnc#1203107).\n\nThe following non-security bugs were fixed:\n\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- cifs: alloc_mid function should be marked as static (bsc#1190317).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1190317).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1190317).\n- cifs: check for smb1 in open_cached_dir() (bsc#1190317).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1190317).\n- cifs: clean up an inconsistent indenting (bsc#1190317).\n- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1190317).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1190317).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1190317).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1190317).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1190317).\n- cifs: fix handlecache and multiuser (bsc#1190317).\n- cifs: fix lock length calculation (bsc#1190317).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1190317).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1190317).\n- cifs: fix NULL ptr dereference in smb2_ioctl_query_info() (bsc#1190317).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1190317).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1190317).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1190317).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1190317).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1190317).\n- cifs: mark sessions for reconnection in helper function (bsc#1190317).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1190317).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1190317).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1190317).\n- cifs: move superblock magic defitions to magic.h (bsc#1190317).\n- cifs: potential buffer overflow in handling symlinks (bsc#1190317).\n- cifs: prevent bad output lengths in smb2_ioctl_query_info() (bsc#1190317).\n- cifs: release cached dentries only if mount is complete (bsc#1190317).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1190317).\n- cifs: remove check of list iterator against head past the loop body (bsc#1190317).\n- cifs: remove minor build warning (bsc#1190317).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1190317).\n- cifs: remove remaining build warnings (bsc#1190317).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1190317).\n- cifs: remove some camelCase and also some static build warnings (bsc#1190317).\n- cifs: remove unnecessary (void*) conversions (bsc#1190317).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1190317).\n- cifs: remove useless DeleteMidQEntry() (bsc#1190317).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1190317).\n- cifs: return errors during session setup during reconnects (bsc#1190317).\n- cifs: return the more nuanced writeback error on close() (bsc#1190317).\n- cifs: sanitize multiple delimiters in prepath (bsc#1190317).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1190317).\n- cifs: skip trailing separators of prefix paths (bsc#1190317).\n- cifs: smbd: fix typo in comment (bsc#1190317).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1190317).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1190317).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1190317).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1190317).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1190317).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1190317).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1190317).\n- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1203462).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (bsc#1154048)\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- Input: iforce - constify usb_device_id and fix space before \u0027[\u0027 error (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: stop telling users to snail-mail Vojtech (git-fixes).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).\n- powerpc: Use device_type helpers to access the node type (bsc#1203424 ltc#199544).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- scsi: ch: Make it possible to open a ch device multiple times again (git-fixes).\n- scsi: core: Avoid that a kernel warning appears during system resume (git-fixes).\n- scsi: core: Avoid that system resume triggers a kernel warning (git-fixes).\n- scsi: fcoe: Embed fc_rport_priv in fcoe_rport structure (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (git-fixes).\n- scsi: lpfc: Check the return value of alloc_workqueue() (git-fixes).\n- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (git-fixes).\n- scsi: mpt3sas: Fix ioctl timeout (git-fixes).\n- scsi: mpt3sas: Fix sync irqs (git-fixes).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (git-fixes).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sd_zbc: Fix compilation warning (git-fixes).\n- scsi: sd: enable compat ioctls for sed-opal (git-fixes).\n- scsi: sd: Fix Opal support (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1190317).\n- smb3: add trace point for SMB2_set_eof (bsc#1190317).\n- smb3: check for null tcon (bsc#1190317).\n- smb3: check xattr value length earlier (bsc#1190317).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1190317).\n- smb3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1190317).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- sysfb: Enable boot time VESA graphic mode selection (bsc#1129770) Backporting notes: \t* context changes \t* config update\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- USB: serial: ftdi_sio: add Belimo device ids (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support.\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- USB: Storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- USB: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (bsc#1154048) Backporting notes: \t* context changes\n- video: fbdev: arkfb: Check the size of screen before memset_io() (bsc#1154048)\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (bsc#1154048)\n- video: fbdev: s3fb: Check the size of screen before memset_io() (bsc#1154048)\n- video: fbdev: sis: fix typos in SiS_GetModeID() (bsc#1154048)\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (bsc#1154048)\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.\n- xhci: bail out early if driver can\u0027t accress host in resume (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3584,SUSE-SLE-SERVER-12-SP5-2022-3584",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3584-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3584-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223584-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3584-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html"
},
{
"category": "self",
"summary": "SUSE Bug 1124235",
"url": "https://bugzilla.suse.com/1124235"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1154048",
"url": "https://bugzilla.suse.com/1154048"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1199564",
"url": "https://bugzilla.suse.com/1199564"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202385",
"url": "https://bugzilla.suse.com/1202385"
},
{
"category": "self",
"summary": "SUSE Bug 1202677",
"url": "https://bugzilla.suse.com/1202677"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203424",
"url": "https://bugzilla.suse.com/1203424"
},
{
"category": "self",
"summary": "SUSE Bug 1203462",
"url": "https://bugzilla.suse.com/1203462"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203933",
"url": "https://bugzilla.suse.com/1203933"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20008 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-10-14T07:52:13Z",
"generator": {
"date": "2022-10-14T07:52:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3584-1",
"initial_release_date": "2022-10-14T07:52:13Z",
"revision_history": [
{
"date": "2022-10-14T07:52:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.112.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.112.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.112.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.112.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.112.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.112.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.112.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.112.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.112.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.112.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.112.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.112.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.112.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.112.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.112.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.112.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.112.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.112.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.112.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.112.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.112.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.112.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.112.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.112.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.112.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.112.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.112.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.112.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.112.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.112.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.112.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.112.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.112.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.112.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.112.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.112.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.112.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.112.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.112.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.112.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-20008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20008"
}
],
"notes": [
{
"category": "general",
"text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20008",
"url": "https://www.suse.com/security/cve/CVE-2022-20008"
},
{
"category": "external",
"summary": "SUSE Bug 1199564 for CVE-2022-20008",
"url": "https://bugzilla.suse.com/1199564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-20008"
},
{
"cve": "CVE-2022-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2503"
}
],
"notes": [
{
"category": "general",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2503",
"url": "https://www.suse.com/security/cve/CVE-2022-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1202677 for CVE-2022-2503",
"url": "https://bugzilla.suse.com/1202677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.112.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.112.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.112.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-14T07:52:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
}
]
}
SUSE-SU-2022:4551-1
Vulnerability from csaf_suse - Published: 2022-12-19 11:08 - Updated: 2022-12-19 11:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150300_59_76 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4551,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4551",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4551-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4551-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224551-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4551-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2022-12-19T11:08:09Z",
"generator": {
"date": "2022-12-19T11:08:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4551-1",
"initial_release_date": "2022-12-19T11:08:09Z",
"revision_history": [
{
"date": "2022-12-19T11:08:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_76-preempt-8-150300.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_76-preempt-8-150300.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_76-preempt-8-150300.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-8-150300.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T11:08:09Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4513-1
Vulnerability from csaf_suse - Published: 2022-12-16 19:06 - Updated: 2022-12-16 19:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-150200_24_126 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4513,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4513,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4514",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4513-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4513-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224513-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4513-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2022-12-16T19:06:47Z",
"generator": {
"date": "2022-12-16T19:06:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4513-1",
"initial_release_date": "2022-12-16T19:06:47Z",
"revision_history": [
{
"date": "2022-12-16T19:06:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_115-preempt-9-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_115-preempt-9-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_115-preempt-9-150200.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-9-150200.2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-6-150200.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-16T19:06:47Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4559-1
Vulnerability from csaf_suse - Published: 2022-12-19 12:06 - Updated: 2022-12-19 12:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.14.21-150400_24_21 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3640: Fixed a use-after-free in l2cap_conn_del of the file net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4559,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4559",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4559-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4559-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224559-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4559-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1204624",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)",
"tracking": {
"current_release_date": "2022-12-19T12:06:19Z",
"generator": {
"date": "2022-12-19T12:06:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4559-1",
"initial_release_date": "2022-12-19T12:06:19Z",
"revision_history": [
{
"date": "2022-12-19T12:06:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-5-150400.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-19T12:06:19Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:4587-1
Vulnerability from csaf_suse - Published: 2022-12-20 12:34 - Updated: 2022-12-20 12:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_107 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-3545: Fixed a use-after-free in area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-41218: Fixed a use-after-free caused by refcount races, affecting dvb_demux_open() and dvb_dmxdev_release() in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4587,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4582,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4587,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4588",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4587-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4587-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224587-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4587-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html"
},
{
"category": "self",
"summary": "SUSE Bug 1203008",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "self",
"summary": "SUSE Bug 1203606",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "self",
"summary": "SUSE Bug 1204424",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "self",
"summary": "SUSE Bug 1204486",
"url": "https://bugzilla.suse.com/1204486"
},
{
"category": "self",
"summary": "SUSE Bug 1204576",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "self",
"summary": "SUSE Bug 1205130",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "self",
"summary": "SUSE Bug 1205815",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "self",
"summary": "SUSE Bug 1206228",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3577 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4139 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4378 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43945 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43945/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2022-12-20T12:34:02Z",
"generator": {
"date": "2022-12-20T12:34:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4587-1",
"initial_release_date": "2022-12-20T12:34:02Z",
"revision_history": [
{
"date": "2022-12-20T12:34:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_99-preempt-17-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_99-preempt-17-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_99-preempt-17-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3545"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3545",
"url": "https://www.suse.com/security/cve/CVE-2022-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1204415 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204415"
},
{
"category": "external",
"summary": "SUSE Bug 1204424 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1204424"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2022-3545",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3577"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3577",
"url": "https://www.suse.com/security/cve/CVE-2022-3577"
},
{
"category": "external",
"summary": "SUSE Bug 1204470 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204470"
},
{
"category": "external",
"summary": "SUSE Bug 1204486 for CVE-2022-3577",
"url": "https://bugzilla.suse.com/1204486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3586"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3586",
"url": "https://www.suse.com/security/cve/CVE-2022-3586"
},
{
"category": "external",
"summary": "SUSE Bug 1204439 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204439"
},
{
"category": "external",
"summary": "SUSE Bug 1204576 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1204576"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212294 for CVE-2022-3586",
"url": "https://bugzilla.suse.com/1212294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4139"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4139",
"url": "https://www.suse.com/security/cve/CVE-2022-4139"
},
{
"category": "external",
"summary": "SUSE Bug 1205700 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205700"
},
{
"category": "external",
"summary": "SUSE Bug 1205815 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1205815"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4139",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4378"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4378",
"url": "https://www.suse.com/security/cve/CVE-2022-4378"
},
{
"category": "external",
"summary": "SUSE Bug 1206207 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206207"
},
{
"category": "external",
"summary": "SUSE Bug 1206228 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1206228"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1211118 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1211118"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218483 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218483"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2022-4378",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43945"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43945",
"url": "https://www.suse.com/security/cve/CVE-2022-43945"
},
{
"category": "external",
"summary": "SUSE Bug 1205128 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205128"
},
{
"category": "external",
"summary": "SUSE Bug 1205130 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1205130"
},
{
"category": "external",
"summary": "SUSE Bug 1208030 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208030"
},
{
"category": "external",
"summary": "SUSE Bug 1208085 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1208085"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1210124 for CVE-2022-43945",
"url": "https://bugzilla.suse.com/1210124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-16-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-15-150200.2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_99-default-17-150200.2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-20T12:34:02Z",
"details": "important"
}
],
"title": "CVE-2022-43945"
}
]
}
SUSE-SU-2022:3844-1
Vulnerability from csaf_suse - Published: 2022-11-01 17:20 - Updated: 2022-11-01 17:20Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bnc#1198189).\n- CVE-2022-32296: Fixed a bug which allowed TCP servers to identify clients by observing what source ports are used (bnc#1200288).\n- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bnc#1203389).\n- CVE-2022-39189: Fixed a bug in the x86 KVM subsystem which allows unprivileged guest users to compromise the guest kernel because TLB flush operations are mishandled (bnc#1203066).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)\n- CVE-2022-42719: Fixed MBSSID parsing use-after-free. (bsc#1204051)\n- CVE-2022-42721: Avoid nontransmitted BSS list corruption. (bsc#1204060)\n- CVE-2022-42720: Fixed BSS refcounting bugs. (bsc#1204059)\n \nThe following non-security bugs were fixed:\n\n- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).\n- ACPI: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bsc#1203767).\n- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).\n- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).\n- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: core: Fix double-free at snd_card_new() (git-fixes).\n- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).\n- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).\n- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).\n- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).\n- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).\n- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).\n- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).\n- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).\n- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).\n- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).\n- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).\n- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).\n- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).\n- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).\n- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).\n- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).\n- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).\n- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).\n- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).\n- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).\n- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).\n- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).\n- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).\n- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).\n- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).\n- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).\n- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).\n- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).\n- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).\n- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).\n- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).\n- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).\n- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).\n- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).\n- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).\n- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).\n- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).\n- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).\n- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).\n- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).\n- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).\n- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).\n- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).\n- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).\n- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).\n- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).\n- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).\n- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).\n- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).\n- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).\n- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).\n- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).\n- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).\n- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).\n- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).\n- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).\n- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).\n- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).\n- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).\n- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).\n- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).\n- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).\n- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).\n- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).\n- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- ALSA: hda/tegra: set depop delay for tegra (git-fixes).\n- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).\n- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).\n- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).\n- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).\n- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes).\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).\n- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: lib: Import latest version of Arm Optimized Routines\u0027 strcmp (git-fixes)\n- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)\n- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).\n- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).\n- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).\n- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).\n- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).\n- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).\n- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).\n- ASoC: cs35l41: Binding fixes (bsc#1203699).\n- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).\n- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).\n- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).\n- ASoC: cs35l41: Correct DSP power down (bsc#1203699).\n- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).\n- ASoC: cs35l41: Correct some control names (bsc#1203699).\n- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).\n- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).\n- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).\n- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).\n- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).\n- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).\n- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).\n- ASoC: cs35l41: DSP Support (bsc#1203699).\n- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).\n- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).\n- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).\n- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).\n- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).\n- ASoC: cs35l41: Fix link problem (bsc#1203699).\n- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).\n- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).\n- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).\n- ASoC: cs35l41: Fixup the error messages (bsc#1203699).\n- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).\n- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).\n- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).\n- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).\n- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).\n- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).\n- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).\n- ASoC: cs35l41: Support external boost (bsc#1203699).\n- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).\n- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).\n- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).\n- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).\n- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).\n- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).\n- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).\n- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).\n- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).\n- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).\n- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).\n- ASoC: cs42l42: Handle system suspend (bsc#1203699).\n- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).\n- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).\n- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).\n- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).\n- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).\n- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).\n- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).\n- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).\n- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).\n- ASoC: cs42l42: Report initial jack state (bsc#1203699).\n- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).\n- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).\n- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).\n- ASoC: cs42l42: Use PLL for SCLK \u003e 12.288MHz (bsc#1203699).\n- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).\n- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).\n- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).\n- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).\n- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).\n- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- ASoC: qcom: sm8250: add missing module owner (git-fixes).\n- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).\n- ASoC: tas2770: Reinit regcache on reset (git-fixes).\n- ASoC: wm_adsp: Add support for \u0027toggle\u0027 preloaders (bsc#1203699).\n- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).\n- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).\n- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).\n- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).\n- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).\n- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).\n- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).\n- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).\n- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).\n- ASoC: wm_adsp: Move check for control existence (bsc#1203699).\n- ASoC: wm_adsp: Move check of dsp-\u003erunning to better place (bsc#1203699).\n- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).\n- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).\n- ASoC: wm_adsp: remove a repeated including (bsc#1203699).\n- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).\n- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).\n- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).\n- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).\n- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).\n- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).\n- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).\n- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).\n- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).\n- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol \u0027ret\u0027 (bsc#1203699).\n- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).\n- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).\n- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).\n- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).\n- bnx2x: fix built-in kernel driver load failure (git-fixes).\n- bnx2x: fix driver load from initrd (git-fixes).\n- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).\n- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).\n- can: gs_usb: gs_can_open(): fix race dev-\u003ecan.state condition (git-fixes).\n- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).\n- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).\n- cgroup: Fix threadgroup_rwsem cpus_read_lock() deadlock (bsc#1196869).\n- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).\n- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)\n- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).\n- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).\n- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).\n- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).\n- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).\n- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).\n- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).\n- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).\n- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).\n- dmaengine: idxd: int handle management refactoring (jsc#PED-682).\n- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).\n- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).\n- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).\n- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).\n- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).\n- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).\n- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).\n- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).\n- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).\n- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amd/display: Mark dml30\u0027s UseMinimumDCFCLK() as noinline for stack usage (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateFlipSchedule() (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).\n- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: make sure to init common IP before gmc (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).\n- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).\n- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).\n- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).\n- drm/bridge: lt8912b: add vsync hsync (git-fixes).\n- drm/bridge: lt8912b: fix corrupted image output (git-fixes).\n- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).\n- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).\n- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).\n- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).\n- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).\n- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).\n- dt-bindings: hwmon: (mr75203) fix \u0027intel,vm-map\u0027 property to be optional (git-fixes).\n- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- efi: libstub: Disable struct randomization (git-fixes).\n- eth: alx: take rtnl_lock on resume (git-fixes).\n- eth: sun: cassini: remove dead code (git-fixes).\n- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: \t* context fixes in other patch \t* update config\n- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).\n- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).\n- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).\n- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).\n- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).\n- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).\n- firmware: cs_dsp: Add pre_run callback (bsc#1203699).\n- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).\n- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).\n- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).\n- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).\n- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).\n- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).\n- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).\n- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).\n- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).\n- firmware: cs_dsp: Print messages from bin files (bsc#1203699).\n- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203798).\n- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).\n- gpio: mockup: remove gpio debugfs when remove device (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).\n- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).\n- hwmon: (mr75203) enable polling for all VM channels (git-fixes).\n- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).\n- hwmon: (mr75203) fix VM sensor allocation when \u0027intel,vm-map\u0027 not defined (git-fixes).\n- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).\n- hwmon: (mr75203) update pvt-\u003ev_num and vm_num to the actual number of used sensors (git-fixes).\n- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).\n- hwmon: (tps23861) fix byte order in resistance register (git-fixes).\n- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).\n- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).\n- i2c: mlxbf: Fix frequency calculation (git-fixes).\n- i2c: mlxbf: incorrect base address passed during io write (git-fixes).\n- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).\n- i2c: mlxbf: support lock mechanism (git-fixes).\n- ice: Allow operation with reduced device MSI-X (bsc#1201987).\n- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).\n- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).\n- ice: fix crash when writing timestamp on RX rings (git-fixes).\n- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).\n- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).\n- ice: Fix race during aux device (un)plugging (git-fixes).\n- ice: Match on all profiles in slow-path (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- igb: skip phy status check where unavailable (git-fixes).\n- Input: goodix - add compatible string for GT1158 (git-fixes).\n- Input: goodix - add support for GT1158 (git-fixes).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iqs62x-keys - drop unused device node references (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- kABI workaround for spi changes (bsc#1203699).\n- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).\n- kABI: fix adding another field to scsi_device (bsc#1203039).\n- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).\n- kbuild: disable header exports for UML in a straightforward way (git-fixes).\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).\n- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: VMX: Heed the \u0027msr\u0027 argument in msr_write_intercepted() (git-fixes).\n- KVM: X86: Fix when shadow_root_level=5 and guest root_level 4 (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_send_ipi() (git-fixes).\n- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).\n- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- lockd: detect and reject lock arguments that overflow (git-fixes).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).\n- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).\n- media: flexcop-usb: fix endpoint type check (git-fixes).\n- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Correct some definition according specification (git-fixes).\n- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).\n- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).\n- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).\n- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).\n- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).\n- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.\n- media: rkvdec: Disable H.264 error detection (git-fixes).\n- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).\n- media: vsp1: Fix offset calculation for plane cropping.\n- misc: cs35l41: Remove unused pdn variable (bsc#1203699).\n- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).\n- mlxsw: i2c: Fix initialization error flow (git-fixes).\n- mm: Fix PASID use-after-free issue (bsc#1203908).\n- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).\n- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).\n- net: axienet: fix RX ring refill allocation failure handling (git-fixes).\n- net: axienet: reset core on initialization prior to MDIO access (git-fixes).\n- net: bcmgenet: hide status block before TX timestamping (git-fixes).\n- net: bcmgenet: Revert \u0027Use stronger register read/writes to assure ordering\u0027 (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).\n- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).\n- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).\n- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).\n- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).\n- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).\n- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).\n- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).\n- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).\n- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).\n- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).\n- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).\n- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).\n- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).\n- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).\n- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).\n- net: ftgmac100: access hardware register after clock ready (git-fixes).\n- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).\n- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).\n- net: ipa: get rid of a duplicate initialization (git-fixes).\n- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).\n- net: ipa: record proper RX transaction count (git-fixes).\n- net: macb: Fix PTP one step sync support (git-fixes).\n- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).\n- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).\n- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).\n- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).\n- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).\n- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).\n- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).\n- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).\n- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).\n- net: phy: at803x: move page selection fix to config_init (git-fixes).\n- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).\n- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).\n- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).\n- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).\n- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).\n- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).\n- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).\n- net: stmmac: only enable DMA interrupts when ready (git-fixes).\n- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).\n- net: stmmac: remove unused get_addr() callback (git-fixes).\n- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).\n- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).\n- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: wwan: iosm: Call mutex_init before locking it (git-fixes).\n- net: wwan: iosm: remove pointless null check (git-fixes).\n- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).\n- net/mlx5: Drain fw_reset when removing device (git-fixes).\n- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).\n- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).\n- net/mlx5e: Remove HW-GRO from reported features (git-fixes).\n- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).\n- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).\n- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).\n- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFS: fix problems with __nfs42_ssc_open (git-fixes).\n- NFS: Fix races in the legacy idmapper upcall (git-fixes).\n- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).\n- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFS: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).\n- NFS: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).\n- NFSD: Clean up the show_nf_flags() macro (git-fixes).\n- NFSD: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Report RDMA connection errors to the server (git-fixes).\n- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of/fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1152489)\n- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)\n- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)\n- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)\n- PCI: Correct misspelled words (git-fixes).\n- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).\n- PCI: Prefer \u0027unsigned int\u0027 over bare \u0027unsigned\u0027 (git-fixes).\n- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).\n- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).\n- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).\n- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).\n- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).\n- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Define static symbols (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).\n- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Fix spelling mistake \u0027definiton\u0027 \u0027definition\u0027 (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: Revert \u0027scsi: qla2xxx: Fix disk failure to rediscover\u0027 (git-fixes).\n- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).\n- selftests: forwarding: add shebang for sch_red.sh (git-fixes).\n- selftests: forwarding: Fix failing tests with old libnet (git-fixes).\n- serial: atmel: remove redundant assignment in rs485_config (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: fsl_lpuart: Reset prior to registration (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- spi: Add API to count spi acpi resources (bsc#1203699).\n- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).\n- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).\n- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).\n- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).\n- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).\n- spi: Return deferred probe error when controller isn\u0027t yet available (bsc#1203699).\n- spi: s3c64xx: Fix large transfers with DMA (git-fixes).\n- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).\n- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).\n- struct ehci_hcd: hide new element going into a hole (git-fixes).\n- struct xhci_hcd: restore member now dynamically allocated (git-fixes).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: fix expiry of auth creds (git-fixes).\n- SUNRPC: Fix xdr_encode_bool() (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).\n- USB: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: Drop commas after SoC match table sentinels (git-fixes).\n- USB: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).\n- USB: dwc3: disable USB core PHY management (git-fixes).\n- USB: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- USB: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).\n- USB: dwc3: gadget: Refactor pullup() (git-fixes).\n- USB: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).\n- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).\n- USB: Fix memory leak in usbnet_disconnect() (git-fixes).\n- USB: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).\n- USB: host: xhci: use ffs() in xhci_mem_init() (git-fixes).\n- USB: hub: avoid warm port reset during USB3 disconnect (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add Quectel RM520N (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: storage: Add ASUS 0x0b05:0x1932 to IGNORE_UAS (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).\n- USB: typec: tipd: Add an additional overflow check (git-fixes).\n- USB: typec: tipd: Do not read/write more bytes than required (git-fixes).\n- USB: typec: ucsi: Remove incorrect warning (git-fixes).\n- USB: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).\n- vfio/type1: Unpin zero pages (git-fixes).\n- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).\n- video: fbdev: i740fb: Error out if \u0027pixclock\u0027 equals zero (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).\n- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).\n- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).\n- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).\n- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).\n- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).\n- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).\n- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).\n- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).\n- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).\n- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).\n- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).\n- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).\n- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).\n- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).\n- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).\n- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).\n- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).\n- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).\n- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).\n- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen-blkback: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkback: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkback: fix persistent grants negotiation (git-fixes).\n- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkfront: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).\n- xen-blkfront: Handle NULL gendisk (git-fixes).\n- xen-netback: only remove \u0027hotplug-status\u0027 when the vif is actually destroyed (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).\n- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).\n- xhci: Allocate separate command structures for each LPM command (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3844,SUSE-SLE-Micro-5.3-2022-3844,SUSE-SLE-Module-Basesystem-15-SP4-2022-3844,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3844,SUSE-SLE-Module-Legacy-15-SP4-2022-3844,SUSE-SLE-Module-Live-Patching-15-SP4-2022-3844,SUSE-SLE-Product-HA-15-SP4-2022-3844,SUSE-SLE-Product-WE-15-SP4-2022-3844,openSUSE-SLE-15.4-2022-3844",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3844-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3844-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223844-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3844-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1190497",
"url": "https://bugzilla.suse.com/1190497"
},
{
"category": "self",
"summary": "SUSE Bug 1194023",
"url": "https://bugzilla.suse.com/1194023"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1195917",
"url": "https://bugzilla.suse.com/1195917"
},
{
"category": "self",
"summary": "SUSE Bug 1196444",
"url": "https://bugzilla.suse.com/1196444"
},
{
"category": "self",
"summary": "SUSE Bug 1196869",
"url": "https://bugzilla.suse.com/1196869"
},
{
"category": "self",
"summary": "SUSE Bug 1197659",
"url": "https://bugzilla.suse.com/1197659"
},
{
"category": "self",
"summary": "SUSE Bug 1198189",
"url": "https://bugzilla.suse.com/1198189"
},
{
"category": "self",
"summary": "SUSE Bug 1200288",
"url": "https://bugzilla.suse.com/1200288"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1201309",
"url": "https://bugzilla.suse.com/1201309"
},
{
"category": "self",
"summary": "SUSE Bug 1201310",
"url": "https://bugzilla.suse.com/1201310"
},
{
"category": "self",
"summary": "SUSE Bug 1201987",
"url": "https://bugzilla.suse.com/1201987"
},
{
"category": "self",
"summary": "SUSE Bug 1202095",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "self",
"summary": "SUSE Bug 1202960",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "self",
"summary": "SUSE Bug 1203039",
"url": "https://bugzilla.suse.com/1203039"
},
{
"category": "self",
"summary": "SUSE Bug 1203066",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "self",
"summary": "SUSE Bug 1203101",
"url": "https://bugzilla.suse.com/1203101"
},
{
"category": "self",
"summary": "SUSE Bug 1203197",
"url": "https://bugzilla.suse.com/1203197"
},
{
"category": "self",
"summary": "SUSE Bug 1203263",
"url": "https://bugzilla.suse.com/1203263"
},
{
"category": "self",
"summary": "SUSE Bug 1203338",
"url": "https://bugzilla.suse.com/1203338"
},
{
"category": "self",
"summary": "SUSE Bug 1203360",
"url": "https://bugzilla.suse.com/1203360"
},
{
"category": "self",
"summary": "SUSE Bug 1203361",
"url": "https://bugzilla.suse.com/1203361"
},
{
"category": "self",
"summary": "SUSE Bug 1203389",
"url": "https://bugzilla.suse.com/1203389"
},
{
"category": "self",
"summary": "SUSE Bug 1203410",
"url": "https://bugzilla.suse.com/1203410"
},
{
"category": "self",
"summary": "SUSE Bug 1203505",
"url": "https://bugzilla.suse.com/1203505"
},
{
"category": "self",
"summary": "SUSE Bug 1203552",
"url": "https://bugzilla.suse.com/1203552"
},
{
"category": "self",
"summary": "SUSE Bug 1203664",
"url": "https://bugzilla.suse.com/1203664"
},
{
"category": "self",
"summary": "SUSE Bug 1203693",
"url": "https://bugzilla.suse.com/1203693"
},
{
"category": "self",
"summary": "SUSE Bug 1203699",
"url": "https://bugzilla.suse.com/1203699"
},
{
"category": "self",
"summary": "SUSE Bug 1203767",
"url": "https://bugzilla.suse.com/1203767"
},
{
"category": "self",
"summary": "SUSE Bug 1203769",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "self",
"summary": "SUSE Bug 1203770",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "self",
"summary": "SUSE Bug 1203794",
"url": "https://bugzilla.suse.com/1203794"
},
{
"category": "self",
"summary": "SUSE Bug 1203798",
"url": "https://bugzilla.suse.com/1203798"
},
{
"category": "self",
"summary": "SUSE Bug 1203893",
"url": "https://bugzilla.suse.com/1203893"
},
{
"category": "self",
"summary": "SUSE Bug 1203902",
"url": "https://bugzilla.suse.com/1203902"
},
{
"category": "self",
"summary": "SUSE Bug 1203906",
"url": "https://bugzilla.suse.com/1203906"
},
{
"category": "self",
"summary": "SUSE Bug 1203908",
"url": "https://bugzilla.suse.com/1203908"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1203939",
"url": "https://bugzilla.suse.com/1203939"
},
{
"category": "self",
"summary": "SUSE Bug 1203987",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "self",
"summary": "SUSE Bug 1203992",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "self",
"summary": "SUSE Bug 1204051",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "self",
"summary": "SUSE Bug 1204059",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "self",
"summary": "SUSE Bug 1204060",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "self",
"summary": "SUSE Bug 1204125",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1263 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2586 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3202 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3239 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3303 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39189 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41848 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-11-01T17:20:26Z",
"generator": {
"date": "2022-11-01T17:20:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3844-1",
"initial_release_date": "2022-11-01T17:20:26Z",
"revision_history": [
{
"date": "2022-11-01T17:20:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product_id": "dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-allwinner-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-altera-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-altera-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-amazon-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-amd-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-amd-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-amlogic-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-apm-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-apm-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-apple-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-apple-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-arm-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-arm-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-broadcom-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-cavium-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-exynos-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-freescale-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-hisilicon-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-lg-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-lg-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-marvell-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-mediatek-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-nvidia-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-qcom-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-renesas-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-rockchip-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-socionext-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-sprd-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"product_id": "dtb-xilinx-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-64kb-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-default-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-default-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"product_id": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-default-devel-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-default-extra-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-default-optional-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-obs-build-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.28.1.aarch64",
"product_id": "kernel-syms-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.21-150400.24.28.1.noarch",
"product": {
"name": "kernel-devel-5.14.21-150400.24.28.1.noarch",
"product_id": "kernel-devel-5.14.21-150400.24.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.14.21-150400.24.28.1.noarch",
"product": {
"name": "kernel-docs-5.14.21-150400.24.28.1.noarch",
"product_id": "kernel-docs-5.14.21-150400.24.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"product": {
"name": "kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"product_id": "kernel-docs-html-5.14.21-150400.24.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.21-150400.24.28.1.noarch",
"product": {
"name": "kernel-macros-5.14.21-150400.24.28.1.noarch",
"product_id": "kernel-macros-5.14.21-150400.24.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.21-150400.24.28.1.noarch",
"product": {
"name": "kernel-source-5.14.21-150400.24.28.1.noarch",
"product_id": "kernel-source-5.14.21-150400.24.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"product_id": "kernel-source-vanilla-5.14.21-150400.24.28.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product_id": "dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-debug-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-default-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-default-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"product_id": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-default-devel-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-default-extra-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-default-optional-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-obs-build-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kernel-syms-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"product_id": "dlm-kmp-default-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-default-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-default-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"product_id": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-default-devel-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-default-extra-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-default-optional-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-obs-build-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-obs-qa-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-syms-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-syms-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"product_id": "kernel-zfcpdump-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-debug-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-debug-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-debug-devel-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-default-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-default-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"product_id": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-default-devel-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-default-extra-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-default-optional-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-obs-build-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.28.1.x86_64",
"product_id": "kernel-syms-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.28.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.28.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.28.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.28.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-altera-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-amd-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-apm-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-apple-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-arm-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-lg-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-debug-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.14.21-150400.24.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.21-150400.24.28.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1263"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1263",
"url": "https://www.suse.com/security/cve/CVE-2022-1263"
},
{
"category": "external",
"summary": "SUSE Bug 1198189 for CVE-2022-1263",
"url": "https://bugzilla.suse.com/1198189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-1263"
},
{
"cve": "CVE-2022-2586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2586"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2586",
"url": "https://www.suse.com/security/cve/CVE-2022-2586"
},
{
"category": "external",
"summary": "SUSE Bug 1202095 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1202095"
},
{
"category": "external",
"summary": "SUSE Bug 1209719 for CVE-2022-2586",
"url": "https://bugzilla.suse.com/1209719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-3202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3202"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3202",
"url": "https://www.suse.com/security/cve/CVE-2022-3202"
},
{
"category": "external",
"summary": "SUSE Bug 1203389 for CVE-2022-3202",
"url": "https://bugzilla.suse.com/1203389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-3202"
},
{
"cve": "CVE-2022-32296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32296"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32296",
"url": "https://www.suse.com/security/cve/CVE-2022-32296"
},
{
"category": "external",
"summary": "SUSE Bug 1200288 for CVE-2022-32296",
"url": "https://bugzilla.suse.com/1200288"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-3239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3239"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3239",
"url": "https://www.suse.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "SUSE Bug 1203552 for CVE-2022-3239",
"url": "https://bugzilla.suse.com/1203552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3303"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3303",
"url": "https://www.suse.com/security/cve/CVE-2022-3303"
},
{
"category": "external",
"summary": "SUSE Bug 1203769 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1203769"
},
{
"category": "external",
"summary": "SUSE Bug 1212304 for CVE-2022-3303",
"url": "https://bugzilla.suse.com/1212304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-39189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39189"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39189",
"url": "https://www.suse.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "SUSE Bug 1203066 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203066"
},
{
"category": "external",
"summary": "SUSE Bug 1203067 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1203067"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39189",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "important"
}
],
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41848"
}
],
"notes": [
{
"category": "general",
"text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41848",
"url": "https://www.suse.com/security/cve/CVE-2022-41848"
},
{
"category": "external",
"summary": "SUSE Bug 1203987 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1203987"
},
{
"category": "external",
"summary": "SUSE Bug 1211484 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1211484"
},
{
"category": "external",
"summary": "SUSE Bug 1212317 for CVE-2022-41848",
"url": "https://bugzilla.suse.com/1212317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41849"
}
],
"notes": [
{
"category": "general",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41849",
"url": "https://www.suse.com/security/cve/CVE-2022-41849"
},
{
"category": "external",
"summary": "SUSE Bug 1203992 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1203992"
},
{
"category": "external",
"summary": "SUSE Bug 1217458 for CVE-2022-41849",
"url": "https://bugzilla.suse.com/1217458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_28-default-1-150400.9.3.5.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.28.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.28.1.150400.24.9.5.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.28.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.28.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-01T17:20:26Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
}
]
}
CERTFR-2023-AVI-0393
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1390"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2022-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4128"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-3522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3522"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0393",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de RedHat\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:2148 du 09 mai 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:2148"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:2951 du 16 mai 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:3190 du 17 mai 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:3190"
}
]
}
CERTFR-2023-AVI-0069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyaux Linux de Debian. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian avec une version du noyau Linux ant\u00e9rieure \u00e0 5.10.162-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4696"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyaux Linux de\nDebian. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyaux Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian du 27 janvier 2023",
"url": "https://www.debian.org/security/2023/dsa-5324"
}
]
}
CERTFR-2022-AVI-967
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-967",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223775-1 du 26 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223775-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223779-1 du 26 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223779-1/"
}
]
}
CERTFR-2022-AVI-922
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3202"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223585-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223586-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223587-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223584-1/"
}
],
"reference": "CERTFR-2022-AVI-922",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3585-1 du 14 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3587-1 du 14 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3586-1 du 14 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3584-1 du 14 octobre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0333
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-1076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1076"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2023-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26606"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2023-28866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28866"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2022-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4842"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2023-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1032"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26605"
},
{
"name": "CVE-2023-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22997"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1652"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
},
{
"name": "CVE-2023-1583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1583"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0333",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0\ndistance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6030-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6030-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6024-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6024-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6031-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6031-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6025-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6025-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6020-1 du 14 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6020-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6029-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6029-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0094-1 du 18 avril 2023",
"url": "https://ubuntu.com/security/notices/LSN-0094-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6033-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6033-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6027-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6027-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6032-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6032-1"
}
]
}
CERTFR-2023-AVI-0192
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-20928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20928"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2023-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0210"
},
{
"name": "CVE-2023-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0469"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0192",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5911-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5911-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5914-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5914-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5912-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5912-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5913-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5913-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5916-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5916-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5915-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5915-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5909-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5909-1"
}
]
}
CERTFR-2022-AVI-1125
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS), une élévation de privilèges, un déni de service, un contournement de la politique de sécurité, une atteinte à l'intégrité des données, une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-BCL | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP4 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Realtime Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2021-33135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33135"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-3526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3526"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3078"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3542"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3202"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-40476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40476"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3535"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2938"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224616-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224613-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224611-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224615-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224614-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224617-1/"
}
],
"reference": "CERTFR-2022-AVI-1125",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es,\nune injection de code indirecte \u00e0 distance (XSS), une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service, un contournement de la politique de\ns\u00e9curit\u00e9, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une ex\u00e9cution de code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4616-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4617-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4614-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4611-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4613-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4615-1 du 23 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0315
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité, une atteinte à l'intégrité des données, une atteinte à la confidentialité des données, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2022-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1195"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26606"
},
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2022-20572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0487"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2023-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0210"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2021-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3428"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3111"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2021-45868",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45868"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2991"
},
{
"name": "CVE-2022-48424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48424"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2022-48423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48423"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3061"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0315",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une\n\u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6009-1 du 11 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6009-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6004-1 du 11 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6004-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6014-1 du 12 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6014-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6013-1 du 12 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6013-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6007-1 du 11 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6007-1"
}
]
}
CERTFR-2023-AVI-0148
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un déni de service à distance, une atteinte à l'intégrité des données, une exécution de code arbitraire, une élévation de privilèges et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Realtime Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-15393",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15393"
},
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2020-36557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36557"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2019-3837",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3837"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2022-3112",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3112"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3107"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2018-7755",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7755"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2021-45868",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45868"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3115"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2017-13695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13695"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-21385",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21385"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3606"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2018-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2023-0122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0122"
},
{
"name": "CVE-2020-36558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36558"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230407-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230409-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 15 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230420-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230433-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 13 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230394-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 15 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230416-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230406-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230410-1/"
}
],
"reference": "CERTFR-2023-AVI-0148",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\nd\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une\nex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0394-1 du 13 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0416-1 du 15 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0420-1 du 15 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0406-1 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0410-1 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0409-1 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0433-1 du 16 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0407-1 du 14 f\u00e9vrier 2023",
"url": null
}
]
}
CERTFR-2023-AVI-0210
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, une atteinte à l'intégrité des données, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-20928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20928"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-20938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20938"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0210",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une\nex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5938-1 du 08 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5938-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0092-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/LSN-0092-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5924-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5924-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5919-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5919-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5940-1 du 09 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5940-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5939-1 du 08 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5939-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5926-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5926-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5934-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5934-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5941-1 du 09 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5941-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5929-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5929-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5925-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5925-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5918-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5918-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5928-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5928-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5927-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5927-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5920-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5920-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5917-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5917-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5935-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5935-1"
}
]
}
CERTFR-2022-AVI-1115
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, un problème de sécurité non spécifié par l'éditeur, une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224539-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224516-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224545-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224546-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224533-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224534-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224518-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224520-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224506-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224513-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224504-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224528-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224542-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224515-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224503-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224517-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224543-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224505-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224527-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224510-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224544-1/"
}
],
"reference": "CERTFR-2022-AVI-1115",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9, une ex\u00e9cution\nde code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4527-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4504-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4518-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4542-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4505-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4517-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4506-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4545-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4510-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4539-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4516-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4520-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4503-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4515-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4546-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4528-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4543-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4544-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4533-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4513-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4534-1 du 17 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0278
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26606"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4842"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2023-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1032"
},
{
"name": "CVE-2023-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0210"
},
{
"name": "CVE-2023-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0469"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1078"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-48424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48424"
},
{
"name": "CVE-2022-48423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48423"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3061"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0278",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, un contournement de la\npolitique de s\u00e9curit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance, une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5975-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5975-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5981-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5981-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5976-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5976-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5982-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5982-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5977-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5977-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5978-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5978-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5980-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5980-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0093-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/LSN-0093-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5979-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5979-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5985-1 du 29 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5985-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5984-1 du 29 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5984-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5987-1 du 29 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5987-1"
}
]
}
CERTFR-2023-AVI-0193
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de DebianLTS. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DebianLTS versions ant\u00e9rieures \u00e0 5.10.162-1~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0240"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2023-23586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23586"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4696"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0193",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans\u00a0le noyau Linux de\n\u003cspan class=\"textit\"\u003eDebianLTS\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de DebianLTS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DebianLTS DLA-3349-1 du 02 mars 2023",
"url": "https://www.debian.org/lts/security/2023/dla-3349"
}
]
}
CERTFR-2023-AVI-0315
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité, une atteinte à l'intégrité des données, une atteinte à la confidentialité des données, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2022-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1195"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26606"
},
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2022-20572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0487"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2023-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0210"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2021-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3428"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3111"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2021-45868",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45868"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2991"
},
{
"name": "CVE-2022-48424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48424"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2022-48423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48423"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3061"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0315",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une\n\u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6009-1 du 11 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6009-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6004-1 du 11 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6004-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6014-1 du 12 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6014-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6013-1 du 12 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6013-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6007-1 du 11 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6007-1"
}
]
}
CERTFR-2023-AVI-0210
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, une atteinte à l'intégrité des données, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-20928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20928"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-20938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20938"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0210",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une\nex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5938-1 du 08 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5938-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0092-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/LSN-0092-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5924-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5924-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5919-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5919-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5940-1 du 09 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5940-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5939-1 du 08 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5939-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5926-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5926-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5934-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5934-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5941-1 du 09 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5941-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5929-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5929-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5925-1 du 06 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5925-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5918-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5918-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5928-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5928-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5927-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5927-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5920-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5920-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5917-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5917-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5935-1 du 07 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5935-1"
}
]
}
CERTFR-2022-AVI-955
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-955",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223704-1 du 24 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223704-1/"
}
]
}
CERTFR-2023-AVI-0069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyaux Linux de Debian. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian avec une version du noyau Linux ant\u00e9rieure \u00e0 5.10.162-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4696"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyaux Linux de\nDebian. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyaux Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian du 27 janvier 2023",
"url": "https://www.debian.org/security/2023/dsa-5324"
}
]
}
CERTFR-2023-AVI-0392
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de DebianLTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DebianLTS 10 (Buster) avec une version du noyau Linux ant\u00e9rieure \u00e0 5.10.178-3~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30772"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-1076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1076"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-1859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1859"
},
{
"name": "CVE-2023-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1078"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-1872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1872"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-1513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1513"
},
{
"name": "CVE-2023-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23004"
},
{
"name": "CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"name": "CVE-2023-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1611"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0392",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\n\u003cspan class=\"textit\"\u003eDebianLTS\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0\ndistance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de DebianLTS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DebianLTS DLA-3404-1 du 15 mai 2023",
"url": "https://www.debian.org/lts/security/2023/dla-3404"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DebianLTS DLA-3403-1 du 15 mai 2023",
"url": "https://www.debian.org/lts/security/2023/dla-3403"
}
]
}
CERTFR-2023-AVI-0392
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de DebianLTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DebianLTS 10 (Buster) avec une version du noyau Linux ant\u00e9rieure \u00e0 5.10.178-3~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30772"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-1076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1076"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-1859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1859"
},
{
"name": "CVE-2023-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1078"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-1872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1872"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-1513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1513"
},
{
"name": "CVE-2023-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23004"
},
{
"name": "CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"name": "CVE-2023-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1611"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0392",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\n\u003cspan class=\"textit\"\u003eDebianLTS\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0\ndistance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de DebianLTS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DebianLTS DLA-3404-1 du 15 mai 2023",
"url": "https://www.debian.org/lts/security/2023/dla-3404"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DebianLTS DLA-3403-1 du 15 mai 2023",
"url": "https://www.debian.org/lts/security/2023/dla-3403"
}
]
}
CERTFR-2022-AVI-976
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une élévation de privilèges, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2020-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27784"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3202"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 31 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223810-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 01 novembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223844-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 31 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223809-1/"
}
],
"reference": "CERTFR-2022-AVI-976",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-11-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3810-1 du 31 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3844-1 du 01 novembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3809-1 du 31 octobre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0244
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26605"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-20938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20938"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0244",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5962-1 du 16 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5962-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5951-1 du 14 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5951-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5950-1 du 14 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5950-1"
}
]
}
CERTFR-2023-AVI-0453
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINAMICS GL150 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.10 | ||
| Siemens | N/A | SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | POWER METER SICAM Q200 family versions antérieures à 2.70 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions | ||
| Siemens | N/A | SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC STEP 7 V5 versions antérieures à 5.7 | ||
| Siemens | N/A | SIMOTION C240 (6AU1240-1AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - Linux Kernel | ||
| Siemens | N/A | SINAUT Software ST7sc toutes versions | ||
| Siemens | N/A | SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions | ||
| Siemens | N/A | Teamcenter Visualization versions 14.0.x antérieures à 14.0.0.6 | ||
| Siemens | N/A | SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC NET PC Software V14 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.1 toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - BIOS | ||
| Siemens | N/A | SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SINAMICS SL150 versions antérieures à 7.2 | ||
| Siemens | N/A | SINAMICS PERFECT HARMONY GH180 6SR5 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.2.x antérieures à 13.2.0.13 | ||
| Siemens | N/A | SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions | ||
| Siemens | N/A | SIMATIC WinCC versions antérieures à 8.0 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.3 | ||
| Siemens | N/A | les contrôlleurs Desigo PX, se référer au bulletin ssa-824231 de l'éditeur pour la liste complète des versions affectées | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-PM toutes versions | ||
| Siemens | N/A | Solid Edge SE2023 versions antérieures à 223.0 Update 5 | ||
| Siemens | N/A | JT2Go versions antérieures à 14.1.0.4 | ||
| Siemens | N/A | SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.8 | ||
| Siemens | N/A | CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) versions 14 à 18 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions | ||
| Siemens | N/A | SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions antérieures à 5.5 SP1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINAMICS GL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q200 family versions ant\u00e9rieures \u00e0 2.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V15 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5 versions ant\u00e9rieures \u00e0 5.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 (6AU1240-1AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - Linux Kernel",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAUT Software ST7sc toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.0.x ant\u00e9rieures \u00e0 14.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V14 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.1 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - BIOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS SL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS PERFECT HARMONY GH180 6SR5 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.2.x ant\u00e9rieures \u00e0 13.2.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les contr\u00f4lleurs Desigo PX, se r\u00e9f\u00e9rer au bulletin ssa-824231 de l\u0027\u00e9diteur pour la liste compl\u00e8te des versions affect\u00e9es",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PM toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2023 versions ant\u00e9rieures \u00e0 223.0 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 14.1.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) versions 14 \u00e0 18",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2018-4834",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4834"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-31238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-33919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33919"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2023-33920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33920"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2023-33124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33124"
},
{
"name": "CVE-2022-43545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43545"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-26495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26495"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42432"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-47946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47946"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-25910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25910"
},
{
"name": "CVE-2023-33921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33921"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2585"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-2078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2078"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-20269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20269"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2022-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36123"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-33122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33122"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43398"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3115"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0171"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-20422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2023-27465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27465"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2023-33121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33121"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2023-28829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28829"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-30757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30757"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2327"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3606"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3104"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30897"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43439"
},
{
"name": "CVE-2023-33123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33123"
},
{
"name": "CVE-2023-30901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
},
{
"name": "CVE-2022-43546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43546"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0453",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-13T00:00:00.000000"
},
{
"description": "Modification de la date du bulletin de s\u00e9curit\u00e9 ssa-824231.",
"revision_date": "2023-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-975766 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-975766.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-042050 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-042050.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-731916 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-731916.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914026 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914026.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-794697 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-538795 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-538795.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831302 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-482956 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-482956.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-508677 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-508677.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-968170 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-824231 du 24 janvier 2018",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-942865 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-942865.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-887249 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-887249.html"
}
]
}
CERTFR-2022-AVI-1122
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, un problème de sécurité non spécifié par l'éditeur, une élévation de privilèges et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3542"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3535"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224566-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224580-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224551-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224569-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224560-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224589-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224577-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224562-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224587-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224595-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224585-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224550-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224559-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224561-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224572-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224573-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224574-1/"
}
],
"reference": "CERTFR-2022-AVI-1122",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance, un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une \u00e9l\u00e9vation de privil\u00e8ges et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4589-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4587-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4560-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4551-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4585-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4566-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4577-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4574-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4561-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4572-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4559-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4580-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4550-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4569-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4562-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4595-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4573-1 du 19 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0192
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-20928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20928"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2023-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0210"
},
{
"name": "CVE-2023-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0469"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0192",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5911-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5911-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5914-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5914-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5912-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5912-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5913-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5913-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5916-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5916-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5915-1 du 03 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5915-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5909-1 du 02 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5909-1"
}
]
}
CERTFR-2023-AVI-0333
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-1076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1076"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2023-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26606"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2023-28866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28866"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2022-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4842"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2023-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1032"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26605"
},
{
"name": "CVE-2023-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22997"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1652"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
},
{
"name": "CVE-2023-1583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1583"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0333",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0\ndistance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6030-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6030-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6024-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6024-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6031-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6031-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6025-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6025-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6020-1 du 14 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6020-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6029-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6029-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0094-1 du 18 avril 2023",
"url": "https://ubuntu.com/security/notices/LSN-0094-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6033-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6033-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6027-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6027-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6032-1 du 19 avril 2023",
"url": "https://ubuntu.com/security/notices/USN-6032-1"
}
]
}
CERTFR-2023-AVI-0393
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1390"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2022-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4128"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-3522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3522"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0393",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de RedHat\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:2148 du 09 mai 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:2148"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:2951 du 16 mai 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2023:3190 du 17 mai 2023",
"url": "https://access.redhat.com/errata/RHSA-2023:3190"
}
]
}
CERTFR-2022-AVI-925
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2020-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27784"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 18 octobre. 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223648-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 18 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223628-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223607-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223599-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223606-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223605-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223601-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 18 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223609-1/"
}
],
"reference": "CERTFR-2022-AVI-925",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3609-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3605-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3648-1 du 18 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3606-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3607-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3599-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3628-1 du 18 octobre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-1122
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, un problème de sécurité non spécifié par l'éditeur, une élévation de privilèges et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3542"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3535"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224566-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224580-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224551-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224569-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224560-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224589-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224577-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224562-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224587-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224595-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 20 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224585-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224550-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224559-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224561-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224572-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224573-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 19 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224574-1/"
}
],
"reference": "CERTFR-2022-AVI-1122",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance, un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une \u00e9l\u00e9vation de privil\u00e8ges et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4589-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4587-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4560-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4551-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4585-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4566-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4577-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4574-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4561-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4572-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4559-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4580-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4550-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4569-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4562-1 du 19 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4595-1 du 20 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4573-1 du 19 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0453
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINAMICS GL150 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.10 | ||
| Siemens | N/A | SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | POWER METER SICAM Q200 family versions antérieures à 2.70 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions | ||
| Siemens | N/A | SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC STEP 7 V5 versions antérieures à 5.7 | ||
| Siemens | N/A | SIMOTION C240 (6AU1240-1AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - Linux Kernel | ||
| Siemens | N/A | SINAUT Software ST7sc toutes versions | ||
| Siemens | N/A | SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions | ||
| Siemens | N/A | Teamcenter Visualization versions 14.0.x antérieures à 14.0.0.6 | ||
| Siemens | N/A | SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC NET PC Software V14 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.1 toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - BIOS | ||
| Siemens | N/A | SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SINAMICS SL150 versions antérieures à 7.2 | ||
| Siemens | N/A | SINAMICS PERFECT HARMONY GH180 6SR5 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.2.x antérieures à 13.2.0.13 | ||
| Siemens | N/A | SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions | ||
| Siemens | N/A | SIMATIC WinCC versions antérieures à 8.0 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.3 | ||
| Siemens | N/A | les contrôlleurs Desigo PX, se référer au bulletin ssa-824231 de l'éditeur pour la liste complète des versions affectées | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-PM toutes versions | ||
| Siemens | N/A | Solid Edge SE2023 versions antérieures à 223.0 Update 5 | ||
| Siemens | N/A | JT2Go versions antérieures à 14.1.0.4 | ||
| Siemens | N/A | SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.8 | ||
| Siemens | N/A | CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) versions 14 à 18 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions | ||
| Siemens | N/A | SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions antérieures à 5.5 SP1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINAMICS GL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q200 family versions ant\u00e9rieures \u00e0 2.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V15 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5 versions ant\u00e9rieures \u00e0 5.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 (6AU1240-1AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - Linux Kernel",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAUT Software ST7sc toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.0.x ant\u00e9rieures \u00e0 14.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V14 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.1 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - BIOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS SL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS PERFECT HARMONY GH180 6SR5 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.2.x ant\u00e9rieures \u00e0 13.2.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les contr\u00f4lleurs Desigo PX, se r\u00e9f\u00e9rer au bulletin ssa-824231 de l\u0027\u00e9diteur pour la liste compl\u00e8te des versions affect\u00e9es",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PM toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2023 versions ant\u00e9rieures \u00e0 223.0 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 14.1.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) versions 14 \u00e0 18",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2018-4834",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4834"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-31238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-33919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33919"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2023-33920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33920"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2023-33124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33124"
},
{
"name": "CVE-2022-43545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43545"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-26495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26495"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42432"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-47946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47946"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-25910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25910"
},
{
"name": "CVE-2023-33921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33921"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2585"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-2078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2078"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-20269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20269"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2022-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36123"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-33122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33122"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43398"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3115"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0171"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-20422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2023-27465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27465"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2023-33121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33121"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2023-28829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28829"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-30757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30757"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2327"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3606"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3104"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30897"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43439"
},
{
"name": "CVE-2023-33123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33123"
},
{
"name": "CVE-2023-30901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
},
{
"name": "CVE-2022-43546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43546"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0453",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-13T00:00:00.000000"
},
{
"description": "Modification de la date du bulletin de s\u00e9curit\u00e9 ssa-824231.",
"revision_date": "2023-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-975766 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-975766.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-042050 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-042050.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-731916 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-731916.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914026 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914026.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-794697 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-538795 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-538795.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831302 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-482956 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-482956.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-508677 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-508677.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-968170 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-824231 du 24 janvier 2018",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-942865 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-942865.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-887249 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-887249.html"
}
]
}
CERTFR-2023-AVI-0193
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de DebianLTS. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DebianLTS versions ant\u00e9rieures \u00e0 5.10.162-1~deb10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0240"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2023-23586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23586"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4696"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0193",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans\u00a0le noyau Linux de\n\u003cspan class=\"textit\"\u003eDebianLTS\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de DebianLTS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DebianLTS DLA-3349-1 du 02 mars 2023",
"url": "https://www.debian.org/lts/security/2023/dla-3349"
}
]
}
CERTFR-2024-AVI-0027
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPView versions versions antérieures à 9.1R5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved version antérieures à 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO | ||
| Juniper Networks | N/A | Paragon Active Assurance versions antérieures à 3.1.2, 3.2.3, 3.3.2 et 3.4.1 | ||
| Juniper Networks | Junos OS | Junos OS version antérieures à 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à SSR-6.2.3-r2 | ||
| Juniper Networks | N/A | Security Director Insights versions antérieures à 23.1R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPView versions versions ant\u00e9rieures \u00e0 9.1R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2024-21602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21602"
},
{
"name": "CVE-2022-41974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41974"
},
{
"name": "CVE-2023-38802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38802"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-41973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41973"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2024-21616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21616"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2024-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21599"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2024-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21614"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2024-21607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21607"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2024-21596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21596"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2024-21604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21604"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2020-9493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9493"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2024-21600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21600"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21606"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-21591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21591"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2024-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21587"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-4254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4254"
},
{
"name": "CVE-2024-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21617"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2024-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21589"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21595"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-22164",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22164"
},
{
"name": "CVE-2024-21597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21597"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2024-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21613"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-21612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21612"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2024-21603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21603"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21585"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2023-36842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36842"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2024-21594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21594"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2024-21601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21601"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591"
}
]
}
CERTFR-2022-AVI-976
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une élévation de privilèges, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2020-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27784"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3202"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 31 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223810-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 01 novembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223844-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 31 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223809-1/"
}
],
"reference": "CERTFR-2022-AVI-976",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-11-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3810-1 du 31 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3844-1 du 01 novembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3809-1 du 31 octobre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-1125
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS), une élévation de privilèges, un déni de service, un contournement de la politique de sécurité, une atteinte à l'intégrité des données, une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-BCL | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP4 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Realtime Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2021-33135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33135"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-3526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3526"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3078"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3542"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3202"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-40476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40476"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-3535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3535"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2938"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224616-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224613-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224611-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224615-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224614-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 23 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224617-1/"
}
],
"reference": "CERTFR-2022-AVI-1125",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es,\nune injection de code indirecte \u00e0 distance (XSS), une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service, un contournement de la politique de\ns\u00e9curit\u00e9, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une ex\u00e9cution de code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4616-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4617-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4614-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4611-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4613-1 du 23 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4615-1 du 23 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-1115
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, un problème de sécurité non spécifié par l'éditeur, une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3577"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224539-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224516-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224545-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224546-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224533-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224534-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224518-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224520-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224506-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224513-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224504-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224528-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224542-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224515-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224503-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224517-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224543-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224505-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224527-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224510-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 d\u00e9cembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224544-1/"
}
],
"reference": "CERTFR-2022-AVI-1115",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9, une ex\u00e9cution\nde code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4527-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4504-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4518-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4542-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4505-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4517-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4506-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4545-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4510-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4539-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4516-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4520-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4503-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4515-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4546-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4528-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4543-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4544-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4533-1 du 17 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4513-1 du 16 d\u00e9cembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:4534-1 du 17 d\u00e9cembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-955
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-955",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223704-1 du 24 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223704-1/"
}
]
}
CERTFR-2024-AVI-0027
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPView versions versions antérieures à 9.1R5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved version antérieures à 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO | ||
| Juniper Networks | N/A | Paragon Active Assurance versions antérieures à 3.1.2, 3.2.3, 3.3.2 et 3.4.1 | ||
| Juniper Networks | Junos OS | Junos OS version antérieures à 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à SSR-6.2.3-r2 | ||
| Juniper Networks | N/A | Security Director Insights versions antérieures à 23.1R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPView versions versions ant\u00e9rieures \u00e0 9.1R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2024-21602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21602"
},
{
"name": "CVE-2022-41974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41974"
},
{
"name": "CVE-2023-38802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38802"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-41973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41973"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2024-21616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21616"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2024-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21599"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2024-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21614"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2024-21607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21607"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2024-21596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21596"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2024-21604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21604"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2020-9493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9493"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2024-21600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21600"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21606"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-21591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21591"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2024-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21587"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-4254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4254"
},
{
"name": "CVE-2024-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21617"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2024-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21589"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21595"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-22164",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22164"
},
{
"name": "CVE-2024-21597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21597"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2024-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21613"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-21612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21612"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2024-21603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21603"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21585"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2023-36842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36842"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2024-21594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21594"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2024-21601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21601"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591"
}
]
}
CERTFR-2022-AVI-945
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-945",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223688-1 du 21 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223688-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223693-1 du 22 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223693-1/"
}
]
}
CERTFR-2022-AVI-945
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-945",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223688-1 du 21 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223688-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223693-1 du 22 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223693-1/"
}
]
}
CERTFR-2023-AVI-0278
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2023-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26606"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4842"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2023-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1032"
},
{
"name": "CVE-2023-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0210"
},
{
"name": "CVE-2023-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0469"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1078"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-48424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48424"
},
{
"name": "CVE-2022-48423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48423"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3061"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0278",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, un contournement de la\npolitique de s\u00e9curit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance, une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5975-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5975-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5981-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5981-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5976-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5976-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5982-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5982-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5977-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5977-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5978-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5978-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5980-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5980-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0093-1 du 27 mars 2023",
"url": "https://ubuntu.com/security/notices/LSN-0093-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5979-1 du 28 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5979-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5985-1 du 29 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5985-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5984-1 du 29 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5984-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5987-1 du 29 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5987-1"
}
]
}
CERTFR-2022-AVI-925
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2020-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27784"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 18 octobre. 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223648-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 18 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223628-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223607-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223599-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223606-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223605-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 17 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223601-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 18 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223609-1/"
}
],
"reference": "CERTFR-2022-AVI-925",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3609-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3605-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3648-1 du 18 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3606-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3607-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3599-1 du 17 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3628-1 du 18 octobre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0148
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un déni de service à distance, une atteinte à l'intégrité des données, une exécution de code arbitraire, une élévation de privilèges et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Realtime Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-15393",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15393"
},
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2020-36557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36557"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2022-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2019-3837",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3837"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4382"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2022-3112",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3112"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3107"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2018-7755",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7755"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2021-45868",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45868"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3115"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2017-13695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13695"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-21385",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21385"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3606"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2018-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2023-0122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0122"
},
{
"name": "CVE-2020-36558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36558"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230407-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230409-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 15 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230420-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 16 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230433-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 13 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230394-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 15 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230416-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230406-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14 f\u00e9vrier 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230410-1/"
}
],
"reference": "CERTFR-2023-AVI-0148",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\nd\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une\nex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0394-1 du 13 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0416-1 du 15 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0420-1 du 15 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0406-1 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0410-1 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0409-1 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0433-1 du 16 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:0407-1 du 14 f\u00e9vrier 2023",
"url": null
}
]
}
CERTFR-2022-AVI-922
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3202"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223585-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223586-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223587-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 14\u00a0octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223584-1/"
}
],
"reference": "CERTFR-2022-AVI-922",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3585-1 du 14 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3587-1 du 14 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3586-1 du 14 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3584-1 du 14 octobre 2022",
"url": null
}
]
}
CERTFR-2023-AVI-0244
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-47521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47521"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4379"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3344"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26605"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-20938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20938"
},
{
"name": "CVE-2022-3424",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3424"
},
{
"name": "CVE-2022-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47519"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2023-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0468"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0244",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5962-1 du 16 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5962-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5951-1 du 14 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5951-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5950-1 du 14 mars 2023",
"url": "https://ubuntu.com/security/notices/USN-5950-1"
}
]
}
CERTFR-2022-AVI-967
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-967",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223775-1 du 26 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223775-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20223779-1 du 26 octobre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223779-1/"
}
]
}
WID-SEC-W-2024-0064
Vulnerability from csaf_certbund - Published: 2024-01-10 23:00 - Updated: 2025-04-10 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nBei den Switches der Juniper EX-Serie handelt es sich um Access- und Aggregations-/Core-Layer-Switches.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS Evolved, Juniper SRX Series, Juniper EX Series, Juniper QFX Series, Juniper ACX Series, Juniper PTX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und seine Berechtigungen zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Appliance\n- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0064 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0064.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0064 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0064"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11272 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA11272"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75233 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75233"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75721 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75721"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75723 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75723"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75725 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75725"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75727 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75727"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75729 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75729"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75730 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75730"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75733 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75733"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75734 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75734"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75735 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75735"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75736 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75736"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75737 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75737"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75738 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75738"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75740 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75740"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75741 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75741"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75742 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75742"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75743 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75743"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75744 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75744"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75745 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75745"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75747 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75747"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75748 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75748"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75752 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75752"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75753 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75753"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75754 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75754"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75755 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75755"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75757 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75757"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA75758 vom 2024-01-10",
"url": "https://supportportal.juniper.net/JSA75758"
},
{
"category": "external",
"summary": "Juniper Security Bulletin",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
}
],
"source_lang": "en-US",
"title": "Juniper Produkte: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-10T22:00:00.000+00:00",
"generator": {
"date": "2025-04-11T08:49:58.286+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-0064",
"initial_release_date": "2024-01-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper EX Series",
"product": {
"name": "Juniper EX Series",
"product_id": "T019811",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:-"
}
}
},
{
"category": "product_version",
"name": "4600",
"product": {
"name": "Juniper EX Series 4600",
"product_id": "T021598",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:ex4600"
}
}
},
{
"category": "product_version",
"name": "4100",
"product": {
"name": "Juniper EX Series 4100",
"product_id": "T030475",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:4100"
}
}
},
{
"category": "product_version",
"name": "4400",
"product": {
"name": "Juniper EX Series 4400",
"product_id": "T030476",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:4400"
}
}
},
{
"category": "product_version",
"name": "EX9200",
"product": {
"name": "Juniper EX Series EX9200",
"product_id": "T031997",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:ex:ex9200"
}
}
}
],
"category": "product_name",
"name": "EX Series"
},
{
"branches": [
{
"category": "product_version",
"name": "Evolved",
"product": {
"name": "Juniper JUNOS Evolved",
"product_id": "T018886",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:evolved"
}
}
},
{
"category": "product_version",
"name": "PTX Series",
"product": {
"name": "Juniper JUNOS PTX Series",
"product_id": "T023853",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:ptx_series"
}
}
},
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T030471",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
},
{
"category": "product_version",
"name": "ACX7024",
"product": {
"name": "Juniper JUNOS ACX7024",
"product_id": "T031994",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7024"
}
}
},
{
"category": "product_version",
"name": "ACX7100-32C",
"product": {
"name": "Juniper JUNOS ACX7100-32C",
"product_id": "T031995",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7100-32c"
}
}
},
{
"category": "product_version",
"name": "ACX7100-48L",
"product": {
"name": "Juniper JUNOS ACX7100-48L",
"product_id": "T031996",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:acx7100-48l"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1R2",
"product": {
"name": "Juniper Junos Space \u003c24.1R2",
"product_id": "T040074"
}
},
{
"category": "product_version",
"name": "24.1R2",
"product": {
"name": "Juniper Junos Space 24.1R2",
"product_id": "T040074-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r2"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
},
{
"category": "product_name",
"name": "Juniper MX Series",
"product": {
"name": "Juniper MX Series",
"product_id": "918766",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:mx:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "5000",
"product": {
"name": "Juniper QFX Series 5000",
"product_id": "T021597",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:qfx:qfx5000"
}
}
}
],
"category": "product_name",
"name": "QFX Series"
},
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T021593",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-2183",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2019-17571",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2019-17571"
},
{
"cve": "CVE-2020-0465",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-0465"
},
{
"cve": "CVE-2020-0466",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-0466"
},
{
"cve": "CVE-2020-12321",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-12321"
},
{
"cve": "CVE-2020-9493",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2021-0920",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-0920"
},
{
"cve": "CVE-2021-25220",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-25220"
},
{
"cve": "CVE-2021-26341",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-26691",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-33655",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-34798",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-3564",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3564"
},
{
"cve": "CVE-2021-3573",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3573"
},
{
"cve": "CVE-2021-3621",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3621"
},
{
"cve": "CVE-2021-3752",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-39275",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-4155",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-44228",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-44790",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44832",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2021-44832"
},
{
"cve": "CVE-2022-0330",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-0330"
},
{
"cve": "CVE-2022-0934",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-0934"
},
{
"cve": "CVE-2022-1462",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1679",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1789",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-1789"
},
{
"cve": "CVE-2022-20141",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-21699",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-21699"
},
{
"cve": "CVE-2022-2196",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2196"
},
{
"cve": "CVE-2022-22942",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-23302",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-25265",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-25265"
},
{
"cve": "CVE-2022-2663",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2795",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-2873",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2873"
},
{
"cve": "CVE-2022-2964",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3028",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-30594",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-3239",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3524",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3564",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3566",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-3619",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3619"
},
{
"cve": "CVE-2022-3623",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3623"
},
{
"cve": "CVE-2022-3625",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3707",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-3707"
},
{
"cve": "CVE-2022-37434",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-38023",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-38023"
},
{
"cve": "CVE-2022-39188",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39189",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-39189"
},
{
"cve": "CVE-2022-41218",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-4129",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-41674",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41974",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-4254",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4254"
},
{
"cve": "CVE-2022-4269",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4269"
},
{
"cve": "CVE-2022-42703",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42720",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42896",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-47929",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2023-0266",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0266"
},
{
"cve": "CVE-2023-0286",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0386",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0386"
},
{
"cve": "CVE-2023-0394",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0461",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0461"
},
{
"cve": "CVE-2023-0767",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1195",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1195"
},
{
"cve": "CVE-2023-1281",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1281"
},
{
"cve": "CVE-2023-1582",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1582"
},
{
"cve": "CVE-2023-1829",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-1829"
},
{
"cve": "CVE-2023-20569",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-2124",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-21830",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21843",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22045",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22045"
},
{
"cve": "CVE-2023-22049",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22049"
},
{
"cve": "CVE-2023-22081",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-2235",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2235"
},
{
"cve": "CVE-2023-22809",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23918",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23918"
},
{
"cve": "CVE-2023-23920",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-23920"
},
{
"cve": "CVE-2023-24329",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-26464",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-26464"
},
{
"cve": "CVE-2023-2650",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-2828",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-32067",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-3341",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3446",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-36842",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-36842"
},
{
"cve": "CVE-2023-3817",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-38408",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-38802",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2023-38802"
},
{
"cve": "CVE-2024-21585",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21585"
},
{
"cve": "CVE-2024-21587",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21587"
},
{
"cve": "CVE-2024-21589",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21589"
},
{
"cve": "CVE-2024-21591",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21591"
},
{
"cve": "CVE-2024-21594",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21594"
},
{
"cve": "CVE-2024-21595",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21595"
},
{
"cve": "CVE-2024-21596",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21596"
},
{
"cve": "CVE-2024-21597",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21597"
},
{
"cve": "CVE-2024-21599",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21599"
},
{
"cve": "CVE-2024-21600",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21600"
},
{
"cve": "CVE-2024-21601",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21601"
},
{
"cve": "CVE-2024-21602",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21602"
},
{
"cve": "CVE-2024-21603",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21603"
},
{
"cve": "CVE-2024-21604",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21604"
},
{
"cve": "CVE-2024-21606",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21606"
},
{
"cve": "CVE-2024-21607",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21607"
},
{
"cve": "CVE-2024-21611",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21611"
},
{
"cve": "CVE-2024-21612",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21612"
},
{
"cve": "CVE-2024-21613",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21613"
},
{
"cve": "CVE-2024-21614",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21614"
},
{
"cve": "CVE-2024-21616",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21616"
},
{
"cve": "CVE-2024-21617",
"product_status": {
"known_affected": [
"T030475",
"T031995",
"T030476",
"T031994",
"T031997",
"T031996",
"918766",
"T030471",
"T021598",
"T040074",
"T018886",
"T021597",
"T019811",
"T023853",
"T021593"
]
},
"release_date": "2024-01-10T23:00:00.000+00:00",
"title": "CVE-2024-21617"
}
]
}
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund - Published: 2024-04-04 22:00 - Updated: 2024-11-27 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell ECS ist ein Objektspeichersystem.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04",
"url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-="
}
],
"source_lang": "en-US",
"title": "Dell ECS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:04.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0794",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.8.1.0",
"product": {
"name": "Dell ECS \u003c3.8.1.0",
"product_id": "T033919"
}
},
{
"category": "product_version",
"name": "3.8.1.0",
"product": {
"name": "Dell ECS 3.8.1.0",
"product_id": "T033919-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:ecs:3.8.1.0"
}
}
}
],
"category": "product_name",
"name": "ECS"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2020-10663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10663"
},
{
"cve": "CVE-2020-10672",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10672"
},
{
"cve": "CVE-2020-10673",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10673"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-10968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10968"
},
{
"cve": "CVE-2020-10969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10969"
},
{
"cve": "CVE-2020-11111",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11111"
},
{
"cve": "CVE-2020-11112",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11112"
},
{
"cve": "CVE-2020-11113",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11113"
},
{
"cve": "CVE-2020-11612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11612"
},
{
"cve": "CVE-2020-11619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11619"
},
{
"cve": "CVE-2020-11620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11620"
},
{
"cve": "CVE-2020-11979",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2020-12762",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-12825",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12825"
},
{
"cve": "CVE-2020-13956",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-14060",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14060"
},
{
"cve": "CVE-2020-14061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14061"
},
{
"cve": "CVE-2020-14062",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14062"
},
{
"cve": "CVE-2020-14195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14195"
},
{
"cve": "CVE-2020-15250",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-15250"
},
{
"cve": "CVE-2020-1945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1945"
},
{
"cve": "CVE-2020-1967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1967"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-24616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24616"
},
{
"cve": "CVE-2020-24750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24750"
},
{
"cve": "CVE-2020-25649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2020-25658",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25658"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-26137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26137"
},
{
"cve": "CVE-2020-26541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2020-27216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27216"
},
{
"cve": "CVE-2020-27218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27218"
},
{
"cve": "CVE-2020-27223",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27223"
},
{
"cve": "CVE-2020-28366",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28493"
},
{
"cve": "CVE-2020-29509",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29509"
},
{
"cve": "CVE-2020-29511",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29511"
},
{
"cve": "CVE-2020-29582",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29582"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2020-35490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35490"
},
{
"cve": "CVE-2020-35491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35491"
},
{
"cve": "CVE-2020-35728",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35728"
},
{
"cve": "CVE-2020-36179",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36179"
},
{
"cve": "CVE-2020-36180",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36180"
},
{
"cve": "CVE-2020-36181",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36181"
},
{
"cve": "CVE-2020-36182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36182"
},
{
"cve": "CVE-2020-36183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36183"
},
{
"cve": "CVE-2020-36184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36184"
},
{
"cve": "CVE-2020-36185",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36185"
},
{
"cve": "CVE-2020-36186",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36186"
},
{
"cve": "CVE-2020-36187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36187"
},
{
"cve": "CVE-2020-36188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36188"
},
{
"cve": "CVE-2020-36189",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36189"
},
{
"cve": "CVE-2020-36516",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-36557",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2020-36691",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2020-7238",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-7238"
},
{
"cve": "CVE-2020-8840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8840"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2020-8911",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8911"
},
{
"cve": "CVE-2020-8912",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8912"
},
{
"cve": "CVE-2020-9488",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9488"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-9546",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9546"
},
{
"cve": "CVE-2020-9547",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9547"
},
{
"cve": "CVE-2020-9548",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9548"
},
{
"cve": "CVE-2021-20190",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20190"
},
{
"cve": "CVE-2021-20323",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20323"
},
{
"cve": "CVE-2021-21290",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21290"
},
{
"cve": "CVE-2021-21295",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21295"
},
{
"cve": "CVE-2021-21409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21409"
},
{
"cve": "CVE-2021-23840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-2471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-2471"
},
{
"cve": "CVE-2021-25642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-25642"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-28153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28153"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-28861",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-3114",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-33036",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33036"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3424"
},
{
"cve": "CVE-2021-34428",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-34428"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3530",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3530"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-3648",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3648"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3711",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-37136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37136"
},
{
"cve": "CVE-2021-37137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2021-37404",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37404"
},
{
"cve": "CVE-2021-37533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37533"
},
{
"cve": "CVE-2021-3754",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3754"
},
{
"cve": "CVE-2021-3778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3826",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3826"
},
{
"cve": "CVE-2021-3827",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3827"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-3872",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3875",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3875"
},
{
"cve": "CVE-2021-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3903"
},
{
"cve": "CVE-2021-3923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-3927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3968"
},
{
"cve": "CVE-2021-3973",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3974"
},
{
"cve": "CVE-2021-3984",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-4069",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4069"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-42567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-42567"
},
{
"cve": "CVE-2021-43797",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44878",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44878"
},
{
"cve": "CVE-2021-45078",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-45078"
},
{
"cve": "CVE-2021-46195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46195"
},
{
"cve": "CVE-2021-46828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0213",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0225",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0225"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1245",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1245"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1466"
},
{
"cve": "CVE-2022-1471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1729",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-1974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-20166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2047",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2048"
},
{
"cve": "CVE-2022-20567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21216"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-21363",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21363"
},
{
"cve": "CVE-2022-21385",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21540",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21540"
},
{
"cve": "CVE-2022-21541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21541"
},
{
"cve": "CVE-2022-21549",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21549"
},
{
"cve": "CVE-2022-21618",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21618"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21702",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2256",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2256"
},
{
"cve": "CVE-2022-2257",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-2264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2285",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-22976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22976"
},
{
"cve": "CVE-2022-22978",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-2304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-2343",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23521"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-24302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24302"
},
{
"cve": "CVE-2022-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-24823",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24823"
},
{
"cve": "CVE-2022-24903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25168",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25168"
},
{
"cve": "CVE-2022-2519",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2519"
},
{
"cve": "CVE-2022-2520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2520"
},
{
"cve": "CVE-2022-2521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2521"
},
{
"cve": "CVE-2022-2522",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2522"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-2571",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-25857",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2598",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-26148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26148"
},
{
"cve": "CVE-2022-26365",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-26612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26612"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27943",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27943"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-2816",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2845",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2845"
},
{
"cve": "CVE-2022-2849",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-28693",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2874",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-28748",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-2889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-29162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29162"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-2923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29583",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29583"
},
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2980",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-29900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-2991",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2991"
},
{
"cve": "CVE-2022-3016",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3099",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3099"
},
{
"cve": "CVE-2022-31030",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31030"
},
{
"cve": "CVE-2022-31159",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31159"
},
{
"cve": "CVE-2022-3134",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3134"
},
{
"cve": "CVE-2022-3153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3153"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-31690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31690"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3234",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3234"
},
{
"cve": "CVE-2022-3235",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3235"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3278",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3278"
},
{
"cve": "CVE-2022-3296",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3296"
},
{
"cve": "CVE-2022-3297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3297"
},
{
"cve": "CVE-2022-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33196"
},
{
"cve": "CVE-2022-3324",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3324"
},
{
"cve": "CVE-2022-3352",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3352"
},
{
"cve": "CVE-2022-33740",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33972",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33972"
},
{
"cve": "CVE-2022-33981",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34266",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34266"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-34903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3491"
},
{
"cve": "CVE-2022-3515",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3520"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-3542",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3591",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3591"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-36437",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36437"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3705"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-37865",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37865"
},
{
"cve": "CVE-2022-37866",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37866"
},
{
"cve": "CVE-2022-38090",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38090"
},
{
"cve": "CVE-2022-38096",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38126"
},
{
"cve": "CVE-2022-38127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38127"
},
{
"cve": "CVE-2022-38177",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38177"
},
{
"cve": "CVE-2022-38178",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38178"
},
{
"cve": "CVE-2022-3821",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38533"
},
{
"cve": "CVE-2022-38749",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38749"
},
{
"cve": "CVE-2022-38750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38750"
},
{
"cve": "CVE-2022-38751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38751"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2022-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39399",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39399"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-40149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40149"
},
{
"cve": "CVE-2022-40150",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-40151",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40151"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-40153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40153"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4141"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41721",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41721"
},
{
"cve": "CVE-2022-41848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-41858",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41903"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2022-41966",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41966"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42010",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-4292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4292"
},
{
"cve": "CVE-2022-4293",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4293"
},
{
"cve": "CVE-2022-42969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42969"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-43995",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43995"
},
{
"cve": "CVE-2022-4415",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45884",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-45939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45939"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-46751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46751"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-47629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-48281",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48281"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0045",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0433",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0433"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-0833",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0833"
},
{
"cve": "CVE-2023-1076",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-1380",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-1390",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1436"
},
{
"cve": "CVE-2023-1513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-20862"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22490"
},
{
"cve": "CVE-2023-2253",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2253"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23946"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-2483",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-24998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-2513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25809"
},
{
"cve": "CVE-2023-25815",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26048"
},
{
"cve": "CVE-2023-26049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26049"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-26604",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26604"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27561"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28486",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28642"
},
{
"cve": "CVE-2023-28772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-29007",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29383",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-30772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30772"
},
{
"cve": "CVE-2023-31084",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-32269",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32269"
},
{
"cve": "CVE-2023-32697",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32697"
},
{
"cve": "CVE-2023-33264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-33264"
},
{
"cve": "CVE-2023-34034",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34034"
},
{
"cve": "CVE-2023-34035",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34035"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-36479",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-36479"
},
{
"cve": "CVE-2023-39533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-39533"
},
{
"cve": "CVE-2023-40167",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40167"
},
{
"cve": "CVE-2023-40217",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-41105",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41105"
},
{
"cve": "CVE-2023-41900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41900"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-21626"
}
]
}
WID-SEC-W-2022-1495
Vulnerability from csaf_certbund - Published: 2022-09-21 22:00 - Updated: 2024-01-25 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1495 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1495.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1495 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1495"
},
{
"category": "external",
"summary": "National Vulnerability Database - CVE-2022-41218 vom 2022-09-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218"
},
{
"category": "external",
"summary": "Exploit auf Openwall.com vom 2022-10-03",
"url": "https://www.openwall.com/lists/oss-security/2022/09/24/1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3586-1 vom 2022-10-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3584-1 vom 2022-10-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3585-1 vom 2022-10-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3587-1 vom 2022-10-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3599-1 vom 2022-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3609-1 vom 2022-10-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3688-1 vom 2022-10-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3693-1 vom 2022-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3704-1 vom 2022-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3779-1 vom 2022-10-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3775-1 vom 2022-10-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3809-1 vom 2022-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3810-1 vom 2022-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3844-1 vom 2022-11-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4506-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4534-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4528-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4543-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4533-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4520-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4516-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4544-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4513-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4527-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4518-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4545-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4551-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4562-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4550-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4569-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4577-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4559-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4595-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4580-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4587-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4617-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5324 vom 2023-01-23",
"url": "https://lists.debian.org/debian-security-announce/2023/msg00013.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0416-1 vom 2023-02-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3349 vom 2023-03-02",
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5915-1 vom 2023-03-03",
"url": "https://ubuntu.com/security/notices/USN-5915-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5917-1 vom 2023-03-03",
"url": "https://ubuntu.com/security/notices/USN-5917-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5927-1 vom 2023-03-07",
"url": "https://ubuntu.com/security/notices/USN-5927-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5924-1 vom 2023-03-06",
"url": "https://ubuntu.com/security/notices/USN-5924-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5934-1 vom 2023-03-07",
"url": "https://ubuntu.com/security/notices/USN-5934-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5939-1 vom 2023-03-08",
"url": "https://ubuntu.com/security/notices/USN-5939-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5940-1 vom 2023-03-09",
"url": "https://ubuntu.com/security/notices/USN-5940-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5951-1 vom 2023-03-14",
"url": "https://ubuntu.com/security/notices/USN-5951-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12200 vom 2023-03-17",
"url": "https://linux.oracle.com/errata/ELSA-2023-12200.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12196 vom 2023-03-17",
"url": "http://linux.oracle.com/errata/ELSA-2023-12196.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12199 vom 2023-03-17",
"url": "http://linux.oracle.com/errata/ELSA-2023-12199.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12206 vom 2023-03-22",
"url": "http://linux.oracle.com/errata/ELSA-2023-12206.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12207 vom 2023-03-22",
"url": "http://linux.oracle.com/errata/ELSA-2023-12207.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5975-1 vom 2023-03-28",
"url": "https://ubuntu.com/security/notices/USN-5975-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5981-1 vom 2023-03-28",
"url": "https://ubuntu.com/security/notices/USN-5981-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5982-1 vom 2023-03-28",
"url": "https://ubuntu.com/security/notices/USN-5982-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023032948"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5987-1 vom 2023-03-29",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023032946"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5991-1 vom 2023-03-31",
"url": "https://ubuntu.com/security/notices/USN-5991-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6000-1 vom 2023-04-06",
"url": "https://ubuntu.com/security/notices/USN-6000-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6001-1 vom 2023-04-06",
"url": "https://ubuntu.com/security/notices/USN-6001-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6009-1 vom 2023-04-12",
"url": "https://ubuntu.com/security/notices/USN-6009-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6004-1 vom 2023-04-11",
"url": "https://ubuntu.com/security/notices/USN-6004-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0094-1 vom 2023-04-19",
"url": "https://ubuntu.com/security/notices/USN-6024-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6030-1 vom 2023-04-19",
"url": "https://ubuntu.com/security/notices/USN-6030-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6024-1 vom 2023-04-25",
"url": "https://ubuntu.com/security/notices/USN-6040-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6043-1 vom 2023-04-26",
"url": "https://ubuntu.com/security/notices/USN-6043-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3403 vom 2023-05-03",
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2951 vom 2023-05-16",
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2736 vom 2023-05-16",
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2951 vom 2023-06-14",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014107.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6235-1 vom 2023-07-18",
"url": "https://ubuntu.com/security/notices/USN-6235-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12688 vom 2023-08-01",
"url": "https://linux.oracle.com/errata/ELSA-2023-12688.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2023-0018 vom 2023-08-08",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-August/014236.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0412 vom 2024-01-25",
"url": "https://access.redhat.com/errata/RHSA-2024:0412"
}
],
"source_lang": "en-US",
"title": "Linux Kernel (dvb-core): Schwachstelle erm\u00f6glicht nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-01-25T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:35:34.065+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-1495",
"initial_release_date": "2022-09-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-09-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-10-03T22:00:00.000+00:00",
"number": "2",
"summary": "Exploit aufgenommen"
},
{
"date": "2022-10-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-17T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-18T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-23T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-24T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-26T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-31T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-01T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-18T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-19T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-26T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-23T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-03-02T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Debian und Ubuntu aufgenommen"
},
{
"date": "2023-03-05T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-06T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-07T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-08T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-09T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-14T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-19T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-03-21T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-03-27T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-28T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-29T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-04-02T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-04-05T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-04-11T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-04-18T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-04-19T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-04-24T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-04-26T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-05-03T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-05-16T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-13T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-18T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-07-31T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-08-08T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2024-01-25T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "42"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel \u003c= 5.19.10",
"product": {
"name": "Open Source Linux Kernel \u003c= 5.19.10",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Linux Kernel aufgrund eines use-after-free Fehlers. Betroffen ist die Komponente \"drivers/media/dvb-core/dmxdev.c\" mit den Funktionen \"dvb_demux_open\" und \"dvb_dmxdev_release\". Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T011119",
"2951",
"T002207",
"67646",
"6368",
"T000126",
"T004914"
]
},
"release_date": "2022-09-21T22:00:00.000+00:00",
"title": "CVE-2022-41218"
}
]
}
WID-SEC-W-2023-1432
Vulnerability from csaf_certbund - Published: 2023-06-12 22:00 - Updated: 2023-06-22 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1432 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1432 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6187-1 vom 2023-06-22",
"url": "https://ubuntu.com/security/notices/USN-6187-1"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
}
],
"source_lang": "en-US",
"title": "Siemens SIMATIC S7: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-22T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:52:18.956+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1432",
"initial_release_date": "2023-06-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-06-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product": {
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product_id": "T028071",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:1500_tm_mfp"
}
}
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26607",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1077",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1073",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1073"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0394",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0179",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2022-47946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47520",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47518",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42722",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42721",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42720",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42719",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42432",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41849",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41674",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-4139",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-41222",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-39190",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3633",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3625",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-36123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-3606",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3534",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-34918",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-3435",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3303",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-32296",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-32250",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3115",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3104",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-30065",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-2978",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-2959",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2905",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-28391",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-28391"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2602",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2585",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2585"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2327",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-23219",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23219"
},
{
"cve": "CVE-2022-23218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23218"
},
{
"cve": "CVE-2022-2274",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21505",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-21166",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21125",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2078",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-20572",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-20566",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20422",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20421",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-1882",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-1852",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1473",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1434",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1343",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1012",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-0171",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2021-42386",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2021-42385",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42384",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42383",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42382",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42381",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42380",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42379",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42377",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42376",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42375",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42374",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-3999",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3999"
},
{
"cve": "CVE-2021-3998",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3998"
},
{
"cve": "CVE-2021-38604",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-38604"
},
{
"cve": "CVE-2021-3759",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-35942",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33574",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33574"
},
{
"cve": "CVE-2021-3326",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-28831",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-27645",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-27645"
},
{
"cve": "CVE-2021-20269",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2020-29562",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2020-27618",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-1752",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-1752"
},
{
"cve": "CVE-2020-10029",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-10029"
},
{
"cve": "CVE-2019-25013",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2018-13405",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2016-10228",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2016-10228"
}
]
}
RHSA-2023_2736
Vulnerability from csaf_redhat - Published: 2023-05-16 08:43 - Updated: 2024-11-15 17:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)\n\n* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)\n\n* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)\n\n* when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656)\n\n* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)\n\n* use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)\n\n* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)\n\n* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)\n\n* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)\n\n* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)\n\n* media: em28xx: initialize refcount before kref_get (CVE-2022-3239)\n\n* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)\n\n* memory leak in ipv6_renew_options() (CVE-2022-3524)\n\n* data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)\n\n* data races around sk-\u003esk_prot (CVE-2022-3567)\n\n* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)\n\n* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)\n\n* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)\n\n* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)\n\n* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)\n\n* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)\n\n* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)\n\n* Executable Space Protection Bypass (CVE-2022-25265)\n\n* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\n* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)\n\n* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)\n\n* Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218)\n\n* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)\n\n* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)\n\n* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)\n\n* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)\n\n* Denial of service in beacon protection for P2P-device (CVE-2022-42722)\n\n* memory corruption in usbmon driver (CVE-2022-43750)\n\n* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)\n\n* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)\n\n* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)\n\n* Soft lockup occurred during __page_mapcount (CVE-2023-1582)\n\n* slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2736",
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index"
},
{
"category": "external",
"summary": "2055499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055499"
},
{
"category": "external",
"summary": "2061703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
},
{
"category": "external",
"summary": "2078466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
},
{
"category": "external",
"summary": "2084125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2090723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
},
{
"category": "external",
"summary": "2108691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
},
{
"category": "external",
"summary": "2108696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696"
},
{
"category": "external",
"summary": "2114937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
},
{
"category": "external",
"summary": "2122228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
},
{
"category": "external",
"summary": "2122960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960"
},
{
"category": "external",
"summary": "2123056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
},
{
"category": "external",
"summary": "2124788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
},
{
"category": "external",
"summary": "2127985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985"
},
{
"category": "external",
"summary": "2130141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
},
{
"category": "external",
"summary": "2133483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
},
{
"category": "external",
"summary": "2134377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
},
{
"category": "external",
"summary": "2134451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
},
{
"category": "external",
"summary": "2134506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
},
{
"category": "external",
"summary": "2134517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
},
{
"category": "external",
"summary": "2134528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
},
{
"category": "external",
"summary": "2137979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
},
{
"category": "external",
"summary": "2143893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
},
{
"category": "external",
"summary": "2143943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
},
{
"category": "external",
"summary": "2144720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
},
{
"category": "external",
"summary": "2150947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
},
{
"category": "external",
"summary": "2150960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
},
{
"category": "external",
"summary": "2150979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
},
{
"category": "external",
"summary": "2150999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999"
},
{
"category": "external",
"summary": "2151270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
},
{
"category": "external",
"summary": "2154171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
},
{
"category": "external",
"summary": "2154235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
},
{
"category": "external",
"summary": "2160023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
},
{
"category": "external",
"summary": "2162120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
},
{
"category": "external",
"summary": "2165721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
},
{
"category": "external",
"summary": "2168246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
},
{
"category": "external",
"summary": "2168297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297"
},
{
"category": "external",
"summary": "2176192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
},
{
"category": "external",
"summary": "2180936",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180936"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2736.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T17:16:44+00:00",
"generator": {
"date": "2024-11-15T17:16:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:2736",
"initial_release_date": "2023-05-16T08:43:55+00:00",
"revision_history": [
{
"date": "2023-05-16T08:43:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-16T08:43:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T17:16:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"product": {
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"product_id": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-477.10.1.rt7.274.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src"
},
"product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "NFV-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src"
},
"product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"relates_to_product_reference": "RT-8.8.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26341",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061703"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "RHBZ#2061703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341"
},
{
"category": "external",
"summary": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before",
"url": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"
},
{
"category": "external",
"summary": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf",
"url": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch"
},
{
"cve": "CVE-2021-33655",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-07-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2108691"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33655"
},
{
"category": "external",
"summary": "RHBZ#2108691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"
}
],
"release_date": "2022-07-08T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory"
},
{
"cve": "CVE-2021-33656",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-07-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2108696"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s console driver functionality in the way a user triggers the ioctl PIO_FONT with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as a having Moderate impact, because only local user with the access to the VGA device can trigger it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33656"
},
{
"category": "external",
"summary": "RHBZ#2108696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch"
}
],
"release_date": "2021-01-05T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds"
},
{
"cve": "CVE-2021-47592",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293235"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix tc flower deletion for VLAN priority Rx steering\n\nTo replicate the issue:-\n\n1) Add 1 flower filter for VLAN Priority based frame steering:-\n$ IFDEVNAME=eth0\n$ tc qdisc add dev $IFDEVNAME ingress\n$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \\\n map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \\\n queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \\\n flower vlan_prio 0 hw_tc 0\n\n2) Get the \u0027pref\u0027 id\n$ tc filter show dev $IFDEVNAME ingress\n\n3) Delete a specific tc flower record (say pref 49151)\n$ tc filter del dev $IFDEVNAME parent ffff: pref 49151\n\nFrom dmesg, we will observe kernel NULL pointer ooops\n\n[ 197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 197.171367] #PF: supervisor read access in kernel mode\n[ 197.171367] #PF: error_code(0x0000) - not-present page\n[ 197.171367] PGD 0 P4D 0\n[ 197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI\n\n\u003csnip\u003e\n\n[ 197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]\n\n\u003csnip\u003e\n\n[ 197.171367] Call Trace:\n[ 197.171367] \u003cTASK\u003e\n[ 197.171367] ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]\n[ 197.171367] stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]\n[ 197.171367] tc_setup_cb_destroy+0xb3/0x180\n[ 197.171367] fl_hw_destroy_filter+0x94/0xc0 [cls_flower]\n\nThe above issue is due to previous incorrect implementation of\ntc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()\nto get struct flow_rule *rule which is no longer valid for tc filter\ndelete operation.\n\n struct flow_rule *rule = flow_cls_offload_flow_rule(cls);\n struct flow_dissector *dissector = rule-\u003ematch.dissector;\n\nSo, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for\nearlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),\nthis patch introduces stmmac_rfs_entry as driver-side flow_cls_offload\nrecord for \u0027RX frame steering\u0027 tc flower, currently used for VLAN\npriority. The implementation has taken consideration for future extension\nto include other type RX frame steering such as EtherType based.\n\nv2:\n - Clean up overly extensive backtrace and rewrite git message to better\n explain the kernel NULL pointer issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47592"
},
{
"category": "external",
"summary": "RHBZ#2293235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293235"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47592",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering"
},
{
"cve": "CVE-2022-1462",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-04-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2078466"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible race condition in drivers/tty/tty_buffers.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1462"
},
{
"category": "external",
"summary": "RHBZ#2078466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2022/q2/155",
"url": "https://seclists.org/oss-sec/2022/q2/155"
}
],
"release_date": "2022-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible race condition in drivers/tty/tty_buffers.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-1679",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084125"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Keeping this issue Moderate, because the impact is limited: likely only possibility of memory leak and crash, but not privileges escalation and both kind of race condition that is hard to trigger.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "RHBZ#2084125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/",
"url": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/"
}
],
"release_date": "2022-02-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module ath9k from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges"
},
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Yongkang Jia",
"Gaoning Pan"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1789",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090723"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 did not provide support for INVPCID in shadow paging mode and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1789"
},
{
"category": "external",
"summary": "RHBZ#2090723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7",
"url": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/25/2",
"url": "https://www.openwall.com/lists/oss-security/2022/05/25/2"
}
],
"release_date": "2022-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva"
},
{
"cve": "CVE-2022-2196",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"discovery_date": "2023-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2160023"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s Intel nested virtualization feature (nVMX). Since L1 and L2 shared branch prediction modes (guest-user and guest-kernel), KVM did not protect indirect branches in L1 from steering by a malicious agent in L2. This could allow a malicious nested guest to carry out Spectre v2 attacks against L1 due to a missing IBPB at VM-exit time.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat currently provides the nested virtualization feature as a Technology Preview. Nested virtualization is therefore unsupported for production use. For more information please refer to https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2196"
},
{
"category": "external",
"summary": "RHBZ#2160023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196"
}
],
"release_date": "2022-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_intel\n# modprobe kvm_intel nested=0\n```",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks"
},
{
"cve": "CVE-2022-2663",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"discovery_date": "2022-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and it incorrectly matches on the message. An attacker could exploit this vulnerability to bypass firewall when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_conntrack_irc message handling issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "RHBZ#2123056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/",
"url": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"
}
],
"release_date": "2022-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nf_conntrack_irc from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_conntrack_irc message handling issue"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122228"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because it can only be triggered by a privileged local user (with CAP_NET_ADMIN or root).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "RHBZ#2122228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5",
"url": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"
}
],
"release_date": "2022-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write"
},
{
"acknowledgments": [
{
"names": [
"Dongliang Mu"
]
}
],
"cve": "CVE-2022-3239",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2127985"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s video4linux driver in how a user triggers the em28xx_usb_probe() for the Empia 28xx-based TV cards. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: media: em28xx: initialize refcount before kref_get",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "RHBZ#2127985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module em28xx from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: media: em28xx: initialize refcount before kref_get"
},
{
"cve": "CVE-2022-3522",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150979"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in hugetlb_no_page in the mm/hugetlb.c file in the Linux Kernel, where a manipulation leads to a race condition. This flaw may allow a local attacker to cause a denial of service and can lead to a kernel information leak issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3522"
},
{
"category": "external",
"summary": "RHBZ#2150979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u",
"url": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"
}
],
"release_date": "2022-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c"
},
{
"cve": "CVE-2022-3524",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150947"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak in ipv6_renew_options()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "RHBZ#2150947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"
}
],
"release_date": "2022-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory leak in ipv6_renew_options()"
},
{
"cve": "CVE-2022-3564",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150999"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated between Moderate and Important (similar to the CVE-2022-45934) because of no known attack, and the attack would be complex. Anyway, consider this CVE-2022-3564 as Important because the use-after-free can potentially lead to privilege escalation or a potential remote system crash (and currently, a read after-free that in most cases would not lead to a remote system crash).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3564"
},
{
"category": "external",
"summary": "RHBZ#2150999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c"
},
{
"cve": "CVE-2022-3566",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2143893"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk-\u003eicsk_af_ops. This issue could allow an attacker to leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3566"
},
{
"category": "external",
"summary": "RHBZ#2143893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"
}
],
"release_date": "2022-10-06T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt"
},
{
"cve": "CVE-2022-3567",
"cwe": {
"id": "CWE-421",
"name": "Race Condition During Access to Alternate Channel"
},
"discovery_date": "2022-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2143943"
}
],
"notes": [
{
"category": "description",
"text": "A data race problem was found in sk-\u003esk_prot in the network subsystem in ipv6 in the Linux kernel. This issue occurs while some functions access critical data, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: data races around sk-\u003esk_prot",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "RHBZ#2143943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: data races around sk-\u003esk_prot"
},
{
"cve": "CVE-2022-3619",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154235"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality. This issue occurs when a user generates malicious packets, triggering the l2cap_recv_acldata function. This flaw allows a local or bluetooth connection user to potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3619"
},
{
"category": "external",
"summary": "RHBZ#2154235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.211918",
"url": "https://vuldb.com/?id.211918"
}
],
"release_date": "2022-10-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c"
},
{
"cve": "CVE-2022-3623",
"cwe": {
"id": "CWE-123",
"name": "Write-what-where Condition"
},
"discovery_date": "2023-01-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2165721"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in follow_page_pte in mm/gup.c in the Linux Kernel. This issue occurs due to a race problem which can poison the page table entry and cause a denial-of-service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3623"
},
{
"category": "external",
"summary": "RHBZ#2165721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"
}
],
"release_date": "2022-09-01T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry"
},
{
"cve": "CVE-2022-3625",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2144720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Netlink device interface implementation in the Linux kernel that improperly handled certain error conditions, leading to a use-after-free issue with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free after failed devlink reload in devlink_param_get",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3625"
},
{
"category": "external",
"summary": "RHBZ#2144720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"
}
],
"release_date": "2022-08-09T08:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free after failed devlink reload in devlink_param_get"
},
{
"cve": "CVE-2022-3628",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150960"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB-accessible buffer overflow in brcmfmac",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "RHBZ#2150960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2022/q4/60",
"url": "https://seclists.org/oss-sec/2022/q4/60"
}
],
"release_date": "2022-10-22T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB-accessible buffer overflow in brcmfmac"
},
{
"cve": "CVE-2022-3707",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2022-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2137979"
}
],
"notes": [
{
"category": "description",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "RHBZ#2137979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/",
"url": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"
}
],
"release_date": "2022-10-07T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed"
},
{
"cve": "CVE-2022-4129",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "RHBZ#2134528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129"
}
],
"release_date": "2022-08-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"discovery_date": "2022-12-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2155788"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4662"
},
{
"category": "external",
"summary": "RHBZ#2155788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/",
"url": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/",
"url": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"
}
],
"release_date": "2022-09-13T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock"
},
{
"cve": "CVE-2022-20141",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2022-08-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2114937"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s IGMP protocol in how a user triggers a race condition in the ip_check_mc_rcu function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "RHBZ#2114937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2"
}
],
"release_date": "2021-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets"
},
{
"cve": "CVE-2022-25265",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2055499"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel when certain binary files have the exec-all attribute with gcc. This issue can cause the execution of bytes located in the non-executable regions of a file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Executable Space Protection Bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25265"
},
{
"category": "external",
"summary": "RHBZ#2055499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294",
"url": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294"
},
{
"category": "external",
"summary": "https://github.com/x0reaxeax/exec-prot-bypass",
"url": "https://github.com/x0reaxeax/exec-prot-bypass"
}
],
"release_date": "2022-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Executable Space Protection Bypass"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2022-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119855"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "RHBZ#2119855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2130141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition (unmap_mapping_range versus munmap). This issue allows a device driver to free a page while it still has stale TLB entries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only occurs in situations with VM_PFNMAP virtual memory areas (VMAs).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "RHBZ#2130141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"
},
{
"category": "external",
"summary": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u",
"url": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"
}
],
"release_date": "2022-07-06T16:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry"
},
{
"cve": "CVE-2022-39189",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "With the current usecase, attacker need a root privileges to exploit this flaw, however there may have ways to defeat this either, but in both cases it seems that Attack Complexity is high (AC:H)",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "RHBZ#2124788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"
}
],
"release_date": "2022-05-30T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning"
},
{
"cve": "CVE-2022-41218",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122960"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s dvb-core subsystem (DVB API used by Digital TV devices) in how a user physically removed a USB device (such as a DVB demultiplexer device) while running malicious code. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Report vmalloc UAF in dvb-core/dmxdev",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Keeping this issue Moderate because the impact is limited: only when the user uses the dvb-core module and removes the USB device triggers the attack. This kind of race condition is hard to trigger and requires several preconditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "RHBZ#2122960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/",
"url": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/"
}
],
"release_date": "2022-09-23T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module dvb-core from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Report vmalloc UAF in dvb-core/dmxdev"
},
{
"cve": "CVE-2022-41674",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134377"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the u8 overflow in cfg80211_update_notlisted_nontrans() in net/wireless/scan.c in the Linux kernel\u2019s wifi subcomponent. This flaw allows an attacker to crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "RHBZ#2134377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2133483"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c functionality in the is_mergeable_anon_vma() function continuously forks, using memory operations to trigger an incorrect reuse of leaf anon_vma. This issue allows a local attacker to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free related to leaf anon_vma double reuse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "RHBZ#2133483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"
}
],
"release_date": "2022-10-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free related to leaf anon_vma double reuse"
},
{
"cve": "CVE-2022-42720",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134451"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in bss_ref_get in the net/wireless/scan.c in\u00a0the Linux kernel. This issue can lead to a denial of service or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "RHBZ#2134451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria, comprised of ease of use and deployment, applicability to widespread installation base, and stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c"
},
{
"cve": "CVE-2022-42721",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134506"
}
],
"notes": [
{
"category": "description",
"text": "A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "RHBZ#2134506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c"
},
{
"cve": "CVE-2022-42722",
"cwe": {
"id": "CWE-705",
"name": "Incorrect Control Flow Scoping"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134517"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in P2P-Device in wifi in ieee80211_rx_h_decrypt in net/mac80211/rx.c in the Linux kernel, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Denial of service in beacon protection for P2P-device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "RHBZ#2134517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mac80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Denial of service in beacon protection for P2P-device"
},
{
"cve": "CVE-2022-43750",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151270"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw in the Linux kernel\u2019s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in usbmon driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "RHBZ#2151270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198",
"url": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"
}
],
"release_date": "2022-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory corruption in usbmon driver"
},
{
"cve": "CVE-2022-47929",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-01-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2168246"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux kernel. This issue may allow a local unprivileged user to trigger a denial of service if the alloc_workqueue function return is not validated in time of failure, resulting in a system crash or leaked internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in traffic control subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-47929"
},
{
"category": "external",
"summary": "RHBZ#2168246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"
}
],
"release_date": "2023-01-09T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NULL pointer dereference in traffic control subsystem"
},
{
"cve": "CVE-2022-48695",
"discovery_date": "2024-05-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278999"
}
],
"notes": [
{
"category": "description",
"text": "A user after-free vulnerability was found in the Linux kernel in the refcount_t variable when performing the controller reset. This issue could lead to denial of service of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpt3sas: Fix use-after-free warning",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48695"
},
{
"category": "external",
"summary": "RHBZ#2278999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48695"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"
}
],
"release_date": "2024-05-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: mpt3sas: Fix use-after-free warning"
},
{
"acknowledgments": [
{
"names": [
"Kyle Zeng"
]
}
],
"cve": "CVE-2023-0394",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-01-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2162120"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in rawv6_push_pending_frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0394"
},
{
"category": "external",
"summary": "RHBZ#2162120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2023/01/18/2",
"url": "https://www.openwall.com/lists/oss-security/2023/01/18/2"
}
],
"release_date": "2023-01-17T17:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NULL pointer dereference in rawv6_push_pending_frames"
},
{
"cve": "CVE-2023-0461",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2176192"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/ulp: use-after-free in listening ULP sockets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0461"
},
{
"category": "external",
"summary": "RHBZ#2176192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c",
"url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"
}
],
"release_date": "2023-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: net/ulp: use-after-free in listening ULP sockets"
},
{
"cve": "CVE-2023-1095",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2173973"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction object not placed on the list head. This flaw allows a local, unprivileged user to crash the system, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1095"
},
{
"category": "external",
"summary": "RHBZ#2173973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095"
}
],
"release_date": "2022-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the affected netfilter kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head"
},
{
"acknowledgments": [
{
"names": [
"Pumpkin (@u1f383)"
],
"organization": "DEVCORE Internship Program, and NYCU Software Security LAB"
}
],
"cve": "CVE-2023-1195",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154171"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1195"
},
{
"category": "external",
"summary": "RHBZ#2154171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621",
"url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"
}
],
"release_date": "2022-10-02T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c"
},
{
"cve": "CVE-2023-1582",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2023-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180936"
}
],
"notes": [
{
"category": "description",
"text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Soft lockup occurred during __page_mapcount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw applies only to RHEL 8.7 kernel version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1582"
},
{
"category": "external",
"summary": "RHBZ#2180936",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180936"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/",
"url": "https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/"
}
],
"release_date": "2022-02-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling THP on the system.\n~~~\nHow to disable THP ? \nhttps://access.redhat.com/solutions/1320153\n~~~",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Soft lockup occurred during __page_mapcount"
},
{
"acknowledgments": [
{
"names": [
"Wei Chen"
]
}
],
"cve": "CVE-2023-2177",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-04-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187953"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2177"
},
{
"category": "external",
"summary": "RHBZ#2187953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2177"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"
}
],
"release_date": "2022-07-25T12:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common"
},
{
"cve": "CVE-2023-22998",
"cwe": {
"id": "CWE-436",
"name": "Interpretation Conflict"
},
"discovery_date": "2023-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2182429"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as they did not include the `virtio_gpu_object_shmem_init` function, introduced upstream in commit 2f2aa13 (\"drm/virtio: move virtio_gpu_mem_entry initialization to new function\").",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-22998"
},
{
"category": "external",
"summary": "RHBZ#2182429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998"
}
],
"release_date": "2023-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()"
},
{
"cve": "CVE-2023-23454",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2168297"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) read problem was found in cbq_classify in net/sched/sch_cbq.c in the Linux kernel. This issue may allow a local attacker to cause a denial of service due to type confusion. Non-negative numbers could indicate a TC_ACT_SHOT condition rather than valid classification results.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab-out-of-bounds read vulnerabilities in cbq_classify",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23454"
},
{
"category": "external",
"summary": "RHBZ#2168297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12"
}
],
"release_date": "2023-01-01T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:43:55+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "workaround",
"details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nIt is also possible to prevent the affected code from being loaded by blacklisting the `cbq` kernel module. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
"RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
"RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab-out-of-bounds read vulnerabilities in cbq_classify"
}
]
}
RHSA-2023:2951
Vulnerability from csaf_redhat - Published: 2023-05-16 08:56 - Updated: 2025-12-04 16:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nThe following packages have been upgraded to a later upstream version: kernel (4.18.0). (BZ#2122230, BZ#2122267)\n\nSecurity Fix(es):\n\n* use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)\n\n* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)\n\n* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)\n\n* when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656)\n\n* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)\n\n* use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)\n\n* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)\n\n* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)\n\n* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)\n\n* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)\n\n* media: em28xx: initialize refcount before kref_get (CVE-2022-3239)\n\n* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)\n\n* memory leak in ipv6_renew_options() (CVE-2022-3524)\n\n* data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)\n\n* data races around sk-\u003esk_prot (CVE-2022-3567)\n\n* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)\n\n* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)\n\n* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)\n\n* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)\n\n* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)\n\n* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)\n\n* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)\n\n* Executable Space Protection Bypass (CVE-2022-25265)\n\n* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\n* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)\n\n* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)\n\n* Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218)\n\n* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)\n\n* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)\n\n* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)\n\n* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)\n\n* Denial of service in beacon protection for P2P-device (CVE-2022-42722)\n\n* memory corruption in usbmon driver (CVE-2022-43750)\n\n* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)\n\n* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)\n\n* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)\n\n* Soft lockup occurred during __page_mapcount (CVE-2023-1582)\n\n* slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2951",
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index"
},
{
"category": "external",
"summary": "2055499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055499"
},
{
"category": "external",
"summary": "2061703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
},
{
"category": "external",
"summary": "2078466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
},
{
"category": "external",
"summary": "2079311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079311"
},
{
"category": "external",
"summary": "2084125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
},
{
"category": "external",
"summary": "2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "2090723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
},
{
"category": "external",
"summary": "2108691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
},
{
"category": "external",
"summary": "2108696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696"
},
{
"category": "external",
"summary": "2114937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
},
{
"category": "external",
"summary": "2116444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116444"
},
{
"category": "external",
"summary": "2122228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
},
{
"category": "external",
"summary": "2122960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960"
},
{
"category": "external",
"summary": "2123056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
},
{
"category": "external",
"summary": "2123854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123854"
},
{
"category": "external",
"summary": "2124788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
},
{
"category": "external",
"summary": "2127985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985"
},
{
"category": "external",
"summary": "2130141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
},
{
"category": "external",
"summary": "2131339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131339"
},
{
"category": "external",
"summary": "2131391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131391"
},
{
"category": "external",
"summary": "2133483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
},
{
"category": "external",
"summary": "2134377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
},
{
"category": "external",
"summary": "2134451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
},
{
"category": "external",
"summary": "2134506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
},
{
"category": "external",
"summary": "2134517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
},
{
"category": "external",
"summary": "2134528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
},
{
"category": "external",
"summary": "2137979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
},
{
"category": "external",
"summary": "2139728",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139728"
},
{
"category": "external",
"summary": "2140163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140163"
},
{
"category": "external",
"summary": "2143893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
},
{
"category": "external",
"summary": "2143943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
},
{
"category": "external",
"summary": "2144720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
},
{
"category": "external",
"summary": "2150947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
},
{
"category": "external",
"summary": "2150960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
},
{
"category": "external",
"summary": "2150979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
},
{
"category": "external",
"summary": "2150999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999"
},
{
"category": "external",
"summary": "2151270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
},
{
"category": "external",
"summary": "2152133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152133"
},
{
"category": "external",
"summary": "2154171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
},
{
"category": "external",
"summary": "2154235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
},
{
"category": "external",
"summary": "2154880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154880"
},
{
"category": "external",
"summary": "2159969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159969"
},
{
"category": "external",
"summary": "2160023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
},
{
"category": "external",
"summary": "2162120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
},
{
"category": "external",
"summary": "2165721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
},
{
"category": "external",
"summary": "2166364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166364"
},
{
"category": "external",
"summary": "2168246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
},
{
"category": "external",
"summary": "2168297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297"
},
{
"category": "external",
"summary": "2176192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
},
{
"category": "external",
"summary": "2180936",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180936"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2951.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-12-04T16:53:44+00:00",
"generator": {
"date": "2025-12-04T16:53:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2023:2951",
"initial_release_date": "2023-05-16T08:56:17+00:00",
"revision_history": [
{
"date": "2023-05-16T08:56:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-16T08:56:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-04T16:53:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "perf-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "perf-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"product_id": "python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.10.1.el8_8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_id": "python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.10.1.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "perf-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "perf-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"product_id": "python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.10.1.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "perf-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "perf-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.10.1.el8_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.10.1.el8_8.src",
"product": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.src",
"product_id": "kernel-0:4.18.0-477.10.1.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.10.1.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-477.10.1.el8_8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"product_id": "kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-477.10.1.el8_8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.10.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.src",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.10.1.el8_8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26341",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061703"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "RHBZ#2061703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341"
},
{
"category": "external",
"summary": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before",
"url": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"
},
{
"category": "external",
"summary": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf",
"url": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch"
},
{
"cve": "CVE-2021-33655",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-07-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2108691"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33655"
},
{
"category": "external",
"summary": "RHBZ#2108691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"
}
],
"release_date": "2022-07-08T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory"
},
{
"cve": "CVE-2021-33656",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-07-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2108696"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s console driver functionality in the way a user triggers the ioctl PIO_FONT with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as a having Moderate impact, because only local user with the access to the VGA device can trigger it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33656"
},
{
"category": "external",
"summary": "RHBZ#2108696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch"
}
],
"release_date": "2021-01-05T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds"
},
{
"cve": "CVE-2021-47221",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282597"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slub: actually fix freelist pointer vs redzoning\n\nIt turns out that SLUB redzoning (\"slub_debug=Z\") checks from\ns-\u003eobject_size rather than from s-\u003einuse (which is normally bumped to\nmake room for the freelist pointer), so a cache created with an object\nsize less than 24 would have the freelist pointer written beyond\ns-\u003eobject_size, causing the redzone to be corrupted by the freelist\npointer. This was very visible with \"slub_debug=ZF\":\n\n BUG test (Tainted: G B ): Right Redzone overwritten\n -----------------------------------------------------------------------------\n\n INFO: 0xffff957ead1c05de-0xffff957ead1c05df @offset=1502. First byte 0x1a instead of 0xbb\n INFO: Slab 0xffffef3950b47000 objects=170 used=170 fp=0x0000000000000000 flags=0x8000000000000200\n INFO: Object 0xffff957ead1c05d8 @offset=1496 fp=0xffff957ead1c0620\n\n Redzone (____ptrval____): bb bb bb bb bb bb bb bb ........\n Object (____ptrval____): 00 00 00 00 00 f6 f4 a5 ........\n Redzone (____ptrval____): 40 1d e8 1a aa @....\n Padding (____ptrval____): 00 00 00 00 00 00 00 00 ........\n\nAdjust the offset to stay within s-\u003eobject_size.\n\n(Note that no caches of in this size range are known to exist in the\nkernel currently.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/slub: actually fix freelist pointer vs redzoning",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47221"
},
{
"category": "external",
"summary": "RHBZ#2282597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282597"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47221"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052135-CVE-2021-47221-4e17@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052135-CVE-2021-47221-4e17@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm/slub: actually fix freelist pointer vs redzoning"
},
{
"cve": "CVE-2021-47592",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293235"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix tc flower deletion for VLAN priority Rx steering\n\nTo replicate the issue:-\n\n1) Add 1 flower filter for VLAN Priority based frame steering:-\n$ IFDEVNAME=eth0\n$ tc qdisc add dev $IFDEVNAME ingress\n$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \\\n map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \\\n queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \\\n flower vlan_prio 0 hw_tc 0\n\n2) Get the \u0027pref\u0027 id\n$ tc filter show dev $IFDEVNAME ingress\n\n3) Delete a specific tc flower record (say pref 49151)\n$ tc filter del dev $IFDEVNAME parent ffff: pref 49151\n\nFrom dmesg, we will observe kernel NULL pointer ooops\n\n[ 197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 197.171367] #PF: supervisor read access in kernel mode\n[ 197.171367] #PF: error_code(0x0000) - not-present page\n[ 197.171367] PGD 0 P4D 0\n[ 197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI\n\n\u003csnip\u003e\n\n[ 197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]\n\n\u003csnip\u003e\n\n[ 197.171367] Call Trace:\n[ 197.171367] \u003cTASK\u003e\n[ 197.171367] ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]\n[ 197.171367] stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]\n[ 197.171367] tc_setup_cb_destroy+0xb3/0x180\n[ 197.171367] fl_hw_destroy_filter+0x94/0xc0 [cls_flower]\n\nThe above issue is due to previous incorrect implementation of\ntc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()\nto get struct flow_rule *rule which is no longer valid for tc filter\ndelete operation.\n\n struct flow_rule *rule = flow_cls_offload_flow_rule(cls);\n struct flow_dissector *dissector = rule-\u003ematch.dissector;\n\nSo, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for\nearlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),\nthis patch introduces stmmac_rfs_entry as driver-side flow_cls_offload\nrecord for \u0027RX frame steering\u0027 tc flower, currently used for VLAN\npriority. The implementation has taken consideration for future extension\nto include other type RX frame steering such as EtherType based.\n\nv2:\n - Clean up overly extensive backtrace and rewrite git message to better\n explain the kernel NULL pointer issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47592"
},
{
"category": "external",
"summary": "RHBZ#2293235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293235"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47592",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering"
},
{
"cve": "CVE-2022-1462",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-04-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2078466"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible race condition in drivers/tty/tty_buffers.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1462"
},
{
"category": "external",
"summary": "RHBZ#2078466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2022/q2/155",
"url": "https://seclists.org/oss-sec/2022/q2/155"
}
],
"release_date": "2022-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible race condition in drivers/tty/tty_buffers.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-1679",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2084125"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Keeping this issue Moderate, because the impact is limited: likely only possibility of memory leak and crash, but not privileges escalation and both kind of race condition that is hard to trigger.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "RHBZ#2084125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/",
"url": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/"
}
],
"release_date": "2022-02-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module ath9k from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges"
},
{
"acknowledgments": [
{
"names": [
"Qiuhao Li"
],
"organization": "Harbin Institute of Technology"
},
{
"names": [
"Yongkang Jia",
"Gaoning Pan"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2022-1789",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2090723"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 did not provide support for INVPCID in shadow paging mode and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1789"
},
{
"category": "external",
"summary": "RHBZ#2090723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7",
"url": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/25/2",
"url": "https://www.openwall.com/lists/oss-security/2022/05/25/2"
}
],
"release_date": "2022-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva"
},
{
"cve": "CVE-2022-2196",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"discovery_date": "2023-01-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2160023"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s Intel nested virtualization feature (nVMX). Since L1 and L2 shared branch prediction modes (guest-user and guest-kernel), KVM did not protect indirect branches in L1 from steering by a malicious agent in L2. This could allow a malicious nested guest to carry out Spectre v2 attacks against L1 due to a missing IBPB at VM-exit time.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat currently provides the nested virtualization feature as a Technology Preview. Nested virtualization is therefore unsupported for production use. For more information please refer to https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2196"
},
{
"category": "external",
"summary": "RHBZ#2160023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196"
}
],
"release_date": "2022-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_intel\n# modprobe kvm_intel nested=0\n```",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks"
},
{
"cve": "CVE-2022-2663",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"discovery_date": "2022-08-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2123056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and it incorrectly matches on the message. An attacker could exploit this vulnerability to bypass firewall when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_conntrack_irc message handling issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "RHBZ#2123056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/",
"url": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"
}
],
"release_date": "2022-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nf_conntrack_irc from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_conntrack_irc message handling issue"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122228"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because it can only be triggered by a privileged local user (with CAP_NET_ADMIN or root).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "RHBZ#2122228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5",
"url": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"
}
],
"release_date": "2022-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write"
},
{
"acknowledgments": [
{
"names": [
"Dongliang Mu"
]
}
],
"cve": "CVE-2022-3239",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2127985"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s video4linux driver in how a user triggers the em28xx_usb_probe() for the Empia 28xx-based TV cards. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: media: em28xx: initialize refcount before kref_get",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3239"
},
{
"category": "external",
"summary": "RHBZ#2127985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module em28xx from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: media: em28xx: initialize refcount before kref_get"
},
{
"cve": "CVE-2022-3522",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-10-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150979"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in hugetlb_no_page in the mm/hugetlb.c file in the Linux Kernel, where a manipulation leads to a race condition. This flaw may allow a local attacker to cause a denial of service and can lead to a kernel information leak issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3522"
},
{
"category": "external",
"summary": "RHBZ#2150979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u",
"url": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"
}
],
"release_date": "2022-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c"
},
{
"cve": "CVE-2022-3524",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-10-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150947"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak in ipv6_renew_options()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3524"
},
{
"category": "external",
"summary": "RHBZ#2150947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"
}
],
"release_date": "2022-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory leak in ipv6_renew_options()"
},
{
"cve": "CVE-2022-3564",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-10-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150999"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated between Moderate and Important (similar to the CVE-2022-45934) because of no known attack, and the attack would be complex. Anyway, consider this CVE-2022-3564 as Important because the use-after-free can potentially lead to privilege escalation or a potential remote system crash (and currently, a read after-free that in most cases would not lead to a remote system crash).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3564"
},
{
"category": "external",
"summary": "RHBZ#2150999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c"
},
{
"cve": "CVE-2022-3566",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-11-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2143893"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk-\u003eicsk_af_ops. This issue could allow an attacker to leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3566"
},
{
"category": "external",
"summary": "RHBZ#2143893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"
}
],
"release_date": "2022-10-06T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt"
},
{
"cve": "CVE-2022-3567",
"cwe": {
"id": "CWE-421",
"name": "Race Condition During Access to Alternate Channel"
},
"discovery_date": "2022-11-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2143943"
}
],
"notes": [
{
"category": "description",
"text": "A data race problem was found in sk-\u003esk_prot in the network subsystem in ipv6 in the Linux kernel. This issue occurs while some functions access critical data, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: data races around sk-\u003esk_prot",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3567"
},
{
"category": "external",
"summary": "RHBZ#2143943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: data races around sk-\u003esk_prot"
},
{
"cve": "CVE-2022-3619",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2022-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154235"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality. This issue occurs when a user generates malicious packets, triggering the l2cap_recv_acldata function. This flaw allows a local or bluetooth connection user to potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3619"
},
{
"category": "external",
"summary": "RHBZ#2154235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"
},
{
"category": "external",
"summary": "https://vuldb.com/?id.211918",
"url": "https://vuldb.com/?id.211918"
}
],
"release_date": "2022-10-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c"
},
{
"cve": "CVE-2022-3623",
"cwe": {
"id": "CWE-123",
"name": "Write-what-where Condition"
},
"discovery_date": "2023-01-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2165721"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in follow_page_pte in mm/gup.c in the Linux Kernel. This issue occurs due to a race problem which can poison the page table entry and cause a denial-of-service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3623"
},
{
"category": "external",
"summary": "RHBZ#2165721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"
}
],
"release_date": "2022-09-01T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry"
},
{
"cve": "CVE-2022-3625",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-11-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2144720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Netlink device interface implementation in the Linux kernel that improperly handled certain error conditions, leading to a use-after-free issue with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free after failed devlink reload in devlink_param_get",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3625"
},
{
"category": "external",
"summary": "RHBZ#2144720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"
}
],
"release_date": "2022-08-09T08:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free after failed devlink reload in devlink_param_get"
},
{
"cve": "CVE-2022-3628",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-12-05T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150960"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB-accessible buffer overflow in brcmfmac",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "RHBZ#2150960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2022/q4/60",
"url": "https://seclists.org/oss-sec/2022/q4/60"
}
],
"release_date": "2022-10-22T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB-accessible buffer overflow in brcmfmac"
},
{
"cve": "CVE-2022-3707",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2022-10-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2137979"
}
],
"notes": [
{
"category": "description",
"text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3707"
},
{
"category": "external",
"summary": "RHBZ#2137979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/",
"url": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"
}
],
"release_date": "2022-10-07T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed"
},
{
"cve": "CVE-2022-4129",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-08-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4129"
},
{
"category": "external",
"summary": "RHBZ#2134528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129"
}
],
"release_date": "2022-08-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"discovery_date": "2022-12-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2155788"
}
],
"notes": [
{
"category": "description",
"text": "An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4662"
},
{
"category": "external",
"summary": "RHBZ#2155788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/",
"url": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/",
"url": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"
}
],
"release_date": "2022-09-13T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock"
},
{
"cve": "CVE-2022-20141",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2022-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2114937"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s IGMP protocol in how a user triggers a race condition in the ip_check_mc_rcu function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "RHBZ#2114937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2"
}
],
"release_date": "2021-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets"
},
{
"cve": "CVE-2022-25265",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2022-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2055499"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel when certain binary files have the exec-all attribute with gcc. This issue can cause the execution of bytes located in the non-executable regions of a file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Executable Space Protection Bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability only applies when running 32 bits executables in an x86_64 kernel. The developer would need to intentionally make its app vulnerable by:\n\n1) Compiling it to 32 bits\n2) Remove the PT_GNU_STACK ELF field by compiling with an old GCC, using some tricky linker flag, or editing the ELF binary.\n\n64 bits executables are immune to this. RHEL 9 does not support 32 bit binaries so there would be no fixes for RHEL 9.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25265"
},
{
"category": "external",
"summary": "RHBZ#2055499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294",
"url": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294"
},
{
"category": "external",
"summary": "https://github.com/x0reaxeax/exec-prot-bypass",
"url": "https://github.com/x0reaxeax/exec-prot-bypass"
}
],
"release_date": "2022-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Executable Space Protection Bypass"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2085300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "RHBZ#2085300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
}
],
"release_date": "2022-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2022-07-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2119855"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "RHBZ#2119855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2130141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition (unmap_mapping_range versus munmap). This issue allows a device driver to free a page while it still has stale TLB entries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only occurs in situations with VM_PFNMAP virtual memory areas (VMAs).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "RHBZ#2130141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"
},
{
"category": "external",
"summary": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u",
"url": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"
}
],
"release_date": "2022-07-06T16:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry"
},
{
"cve": "CVE-2022-39189",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "With the current usecase, attacker need a root privileges to exploit this flaw, however there may have ways to defeat this either, but in both cases it seems that Attack Complexity is high (AC:H)",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-39189"
},
{
"category": "external",
"summary": "RHBZ#2124788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"
}
],
"release_date": "2022-05-30T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning"
},
{
"cve": "CVE-2022-41218",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-08-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122960"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s dvb-core subsystem (DVB API used by Digital TV devices) in how a user physically removed a USB device (such as a DVB demultiplexer device) while running malicious code. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Report vmalloc UAF in dvb-core/dmxdev",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Keeping this issue Moderate because the impact is limited: only when the user uses the dvb-core module and removes the USB device triggers the attack. This kind of race condition is hard to trigger and requires several preconditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "RHBZ#2122960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/",
"url": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/"
}
],
"release_date": "2022-09-23T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module dvb-core from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Report vmalloc UAF in dvb-core/dmxdev"
},
{
"cve": "CVE-2022-41674",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134377"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in the u8 overflow in cfg80211_update_notlisted_nontrans() in net/wireless/scan.c in the Linux kernel\u2019s wifi subcomponent. This flaw allows an attacker to crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "RHBZ#2134377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2133483"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c functionality in the is_mergeable_anon_vma() function continuously forks, using memory operations to trigger an incorrect reuse of leaf anon_vma. This issue allows a local attacker to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free related to leaf anon_vma double reuse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42703"
},
{
"category": "external",
"summary": "RHBZ#2133483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"
}
],
"release_date": "2022-10-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free related to leaf anon_vma double reuse"
},
{
"cve": "CVE-2022-42720",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134451"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in bss_ref_get in the net/wireless/scan.c in\u00a0the Linux kernel. This issue can lead to a denial of service or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "RHBZ#2134451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria, comprised of ease of use and deployment, applicability to widespread installation base, and stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c"
},
{
"cve": "CVE-2022-42721",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134506"
}
],
"notes": [
{
"category": "description",
"text": "A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "RHBZ#2134506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c"
},
{
"cve": "CVE-2022-42722",
"cwe": {
"id": "CWE-705",
"name": "Incorrect Control Flow Scoping"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134517"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in P2P-Device in wifi in ieee80211_rx_h_decrypt in net/mac80211/rx.c in the Linux kernel, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Denial of service in beacon protection for P2P-device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "RHBZ#2134517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
}
],
"release_date": "2022-10-13T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mac80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Denial of service in beacon protection for P2P-device"
},
{
"cve": "CVE-2022-43750",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-10-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151270"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw in the Linux kernel\u2019s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in usbmon driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-43750"
},
{
"category": "external",
"summary": "RHBZ#2151270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198",
"url": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"
}
],
"release_date": "2022-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory corruption in usbmon driver"
},
{
"cve": "CVE-2022-47929",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-01-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2168246"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux kernel. This issue may allow a local unprivileged user to trigger a denial of service if the alloc_workqueue function return is not validated in time of failure, resulting in a system crash or leaked internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in traffic control subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-47929"
},
{
"category": "external",
"summary": "RHBZ#2168246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"
}
],
"release_date": "2023-01-09T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NULL pointer dereference in traffic control subsystem"
},
{
"cve": "CVE-2022-48695",
"discovery_date": "2024-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278999"
}
],
"notes": [
{
"category": "description",
"text": "A user after-free vulnerability was found in the Linux kernel in the refcount_t variable when performing the controller reset. This issue could lead to denial of service of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpt3sas: Fix use-after-free warning",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48695"
},
{
"category": "external",
"summary": "RHBZ#2278999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48695"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"
}
],
"release_date": "2024-05-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: mpt3sas: Fix use-after-free warning"
},
{
"cve": "CVE-2022-48696",
"discovery_date": "2024-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278959"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: spi: Reserve space for register address/padding\n\nCurrently the max_raw_read and max_raw_write limits in regmap_spi struct\ndo not take into account the additional size of the transmitted register\naddress and padding. This may result in exceeding the maximum permitted\nSPI message size, which could cause undefined behaviour, e.g. data\ncorruption.\n\nFix regmap_get_spi_bus() to properly adjust the above mentioned limits\nby reserving space for the register address/padding as set in the regmap\nconfiguration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: regmap: spi: Reserve space for register address/padding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-9.2 and above (including RHEL-8.10):\n~~~\nin (rhel-9.2, rhel-9.3, rhel-9.4, rhel-9.5) regmap: spi: Reserve space for register address/padding\nin (rhel-8.8, rhel-8.9, rhel-8.10) regmap: spi: Reserve space for register address/padding\n~~~\nPlease note that while RHEL-9 kernel-rt still appears as affected, it has been fixed in the same RHSA as RHEL-9 kernel. This is because from RHEL-9.3 onwards, the kernel and kernel-rt fixes are bundled together in a single errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48696"
},
{
"category": "external",
"summary": "RHBZ#2278959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48696"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48696",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48696"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48696-b671@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48696-b671@gregkh/T"
}
],
"release_date": "2024-05-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: regmap: spi: Reserve space for register address/padding"
},
{
"cve": "CVE-2022-48701",
"discovery_date": "2024-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278950"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel ALSA USB audio driver. This vulnerability allows a denial of service via a crafted USB audio device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ALSA: usb-audio: ALSA USB Audio Out-of-Bounds Bug",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48701"
},
{
"category": "external",
"summary": "RHBZ#2278950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278950"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48701",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48701"
}
],
"release_date": "2024-05-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ALSA: usb-audio: ALSA USB Audio Out-of-Bounds Bug"
},
{
"cve": "CVE-2022-48883",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2024-08-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2306404"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent\n\nA user is able to configure an arbitrary number of rx queues when\ncreating an interface via netlink. This doesn\u0027t work for child PKEY\ninterfaces because the child interface uses the parent receive channels.\n\nAlthough the child shares the parent\u0027s receive channels, the number of\nrx queues is important for the channel_stats array: the parent\u0027s rx\nchannel index is used to access the child\u0027s channel_stats. So the array\nhas to be at least as large as the parent\u0027s rx queue size for the\ncounting to work correctly and to prevent out of bound accesses.\n\nThis patch checks for the mentioned scenario and returns an error when\ntrying to create the interface. The error is propagated to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-9.2 and above (including RHEL 8.10)\n~~~\nin (rhel-8.8, rhel-8.9, rhel-8.10) net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent\nin (rhel-9.2, rhel-9.3, rhel-9.4, rhel-9.5) net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent\n~~~\n\nPlease note that while RHEL-9 kernel-rt still appears as affected, it has been fixed in the same RHSA as RHEL-9 kernel. This is because from RHEL-9.3 onwards, the kernel and kernel-rt fixes are bundled together in a single errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48883"
},
{
"category": "external",
"summary": "RHBZ#2306404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2306404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48883"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082108-CVE-2022-48883-4df4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082108-CVE-2022-48883-4df4@gregkh/T"
}
],
"release_date": "2024-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent"
},
{
"cve": "CVE-2022-48884",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-08-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2306405"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix command stats access after free\n\nCommand may fail while driver is reloading and can\u0027t accept FW commands\ntill command interface is reinitialized. Such command failure is being\nlogged to command stats. This results in NULL pointer access as command\nstats structure is being freed and reallocated during mlx5 devlink\nreload (see kernel log below).\n\nFix it by making command stats statically allocated on driver probe.\n\nKernel log:\n[ 2394.808802] BUG: unable to handle kernel paging request at 000000000002a9c0\n[ 2394.810610] PGD 0 P4D 0\n[ 2394.811811] Oops: 0002 [#1] SMP NOPTI\n...\n[ 2394.815482] RIP: 0010:native_queued_spin_lock_slowpath+0x183/0x1d0\n...\n[ 2394.829505] Call Trace:\n[ 2394.830667] _raw_spin_lock_irq+0x23/0x26\n[ 2394.831858] cmd_status_err+0x55/0x110 [mlx5_core]\n[ 2394.833020] mlx5_access_reg+0xe7/0x150 [mlx5_core]\n[ 2394.834175] mlx5_query_port_ptys+0x78/0xa0 [mlx5_core]\n[ 2394.835337] mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core]\n[ 2394.836454] ? kmem_cache_alloc_trace+0x140/0x1c0\n[ 2394.837562] __rh_call_get_link_ksettings+0x33/0x100\n[ 2394.838663] ? __rtnl_unlock+0x25/0x50\n[ 2394.839755] __ethtool_get_link_ksettings+0x72/0x150\n[ 2394.840862] duplex_show+0x6e/0xc0\n[ 2394.841963] dev_attr_show+0x1c/0x40\n[ 2394.843048] sysfs_kf_seq_show+0x9b/0x100\n[ 2394.844123] seq_read+0x153/0x410\n[ 2394.845187] vfs_read+0x91/0x140\n[ 2394.846226] ksys_read+0x4f/0xb0\n[ 2394.847234] do_syscall_64+0x5b/0x1a0\n[ 2394.848228] entry_SYSCALL_64_after_hwframe+0x65/0xca",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5: Fix command stats access after free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-9.2 and above (including RHEL 8.10)\n~~~\nbf13eb7f6314 (in rhel-8.8, rhel-8.9, rhel-8.10) net/mlx5: Fix command stats access after free\nfb03f081910b (in rhel-9.2, rhel-9.3, rhel-9.4, rhel-9.5) net/mlx5: Fix command stats access after free\n~~~\n\nPlease note that while RHEL-9 kernel-rt still appears as affected, it has been fixed in the same RHSA as RHEL-9 kernel. This is because from RHEL-9.3 onwards, the kernel and kernel-rt fixes are bundled together in a single errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48884"
},
{
"category": "external",
"summary": "RHBZ#2306405",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2306405"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48884"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082108-CVE-2022-48884-b273@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082108-CVE-2022-48884-b273@gregkh/T"
}
],
"release_date": "2024-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5: Fix command stats access after free"
},
{
"cve": "CVE-2022-48992",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-10-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2320793"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: soc-pcm: Add NULL check in BE reparenting\n\nAdd NULL check in dpcm_be_reparent API, to handle\nkernel NULL pointer dereference error.\nThe issue occurred in fuzzing test.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ASoC: soc-pcm: Add NULL check in BE reparenting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-9.2 and above (including 8.10):\n~~~\nin (rhel-9.2, rhel-9.3, rhel-9.4, rhel-9.5, rhel-9.6) ASoC: soc-pcm: Add NULL check in BE reparenting\nin (rhel-8.8, rhel-8.9, rhel-8.10) ASoC: soc-pcm: Add NULL check in BE reparenting\n~~~\n\nPlease note that while RHEL-9 kernel-rt still appears as affected, it has been fixed in the same RHSA as RHEL-9 kernel. This is because from RHEL-9.3 onwards, the kernel and kernel-rt fixes are bundled together in a single errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48992"
},
{
"category": "external",
"summary": "RHBZ#2320793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48992",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48992"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/T"
}
],
"release_date": "2024-10-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ASoC: soc-pcm: Add NULL check in BE reparenting"
},
{
"cve": "CVE-2022-49010",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-10-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2320780"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (coretemp) Check for null before removing sysfs attrs\n\nIf coretemp_add_core() gets an error then pdata-\u003ecore_data[indx]\nis already NULL and has been kfreed. Don\u0027t pass that to\nsysfs_remove_group() as that will crash in sysfs_remove_group().\n\n[Shortened for readability]\n[91854.020159] sysfs: cannot create duplicate filename \u0027/devices/platform/coretemp.0/hwmon/hwmon2/temp20_label\u0027\n\u003ccpu offline\u003e\n[91855.126115] BUG: kernel NULL pointer dereference, address: 0000000000000188\n[91855.165103] #PF: supervisor read access in kernel mode\n[91855.194506] #PF: error_code(0x0000) - not-present page\n[91855.224445] PGD 0 P4D 0\n[91855.238508] Oops: 0000 [#1] PREEMPT SMP PTI\n...\n[91855.342716] RIP: 0010:sysfs_remove_group+0xc/0x80\n...\n[91855.796571] Call Trace:\n[91855.810524] coretemp_cpu_offline+0x12b/0x1dd [coretemp]\n[91855.841738] ? coretemp_cpu_online+0x180/0x180 [coretemp]\n[91855.871107] cpuhp_invoke_callback+0x105/0x4b0\n[91855.893432] cpuhp_thread_fun+0x8e/0x150\n...\n\nFix this by checking for NULL first.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (coretemp) Check for null before removing sysfs attrs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-9.2 and above (including RHEL 8.10)\n~~~\nf1215e1da161 (in rhel-9.2, rhel-9.3, rhel-9.4, rhel-9.5, rhel-9.6) hwmon: (coretemp) Check for null before removing sysfs attrs\n5e2e2086e01a (in rhel-8.8, rhel-8.9, rhel-8.10) hwmon: (coretemp) Check for null before removing sysfs attrs\n~~~\n\nPlease note that while RHEL-9 kernel-rt still appears as affected, it has been fixed in the same RHSA as RHEL-9 kernel. This is because from RHEL-9.3 onwards, the kernel and kernel-rt fixes are bundled together in a single errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49010"
},
{
"category": "external",
"summary": "RHBZ#2320780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320780"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49010"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/T"
}
],
"release_date": "2024-10-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (coretemp) Check for null before removing sysfs attrs"
},
{
"cve": "CVE-2022-49114",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348136"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s SCSI libfc library in the `fc_exch_abts_resp()` function, which can lead to a use-after-free scenario. This issue can occur because the function calls `fc_exch_release()`, which decrements a reference count stored in the `ep` object and then frees the object once the count is zero. However, the `ep` object is referenced again and can result in the now-freed `ep` pointer being accessed, resulting in system instability, memory corruption, and potential arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49114"
},
{
"category": "external",
"summary": "RHBZ#2348136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49114"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49114-86bb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49114-86bb@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp()"
},
{
"cve": "CVE-2022-49294",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348003"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check if modulo is 0 before dividing.\n\n[How \u0026 Why]\nIf a value of 0 is read, then this will cause a divide-by-0 panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amd/display: Check if modulo is 0 before dividing.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49294"
},
{
"category": "external",
"summary": "RHBZ#2348003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49294"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49294",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49294"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022625-CVE-2022-49294-a2fc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022625-CVE-2022-49294-a2fc@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amd/display: Check if modulo is 0 before dividing."
},
{
"cve": "CVE-2022-49319",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347683"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu-v3: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49319"
},
{
"category": "external",
"summary": "RHBZ#2347683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49319"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2022-49319-f0b3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2022-49319-f0b3@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource()"
},
{
"cve": "CVE-2022-49323",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347660"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()\n\nIt will cause null-ptr-deref when using \u0027res\u0027, if platform_get_resource()\nreturns NULL, so move using \u0027res\u0027 after devm_ioremap_resource() that\nwill check it to avoid null-ptr-deref.\nAnd use devm_platform_get_and_ioremap_resource() to simplify code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49323"
},
{
"category": "external",
"summary": "RHBZ#2347660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49323"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2022-49323-7559@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2022-49323-7559@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()"
},
{
"cve": "CVE-2022-49328",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348217"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mt76 wi-fi driver. A concurrency bug causes the `mtxq` TX queue to maintain a raw pointer to a `wcid` structure (`mtxq-\u003ewcid`) that might be freed by the time it is accessed. This issue can lead to a use-after-free scenario, leading to system instability, memory corruption, and potentially arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49328"
},
{
"category": "external",
"summary": "RHBZ#2348217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348217"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49328"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49328",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49328"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2022-49328-ec2f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2022-49328-ec2f@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer"
},
{
"cve": "CVE-2022-49330",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348206"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix tcp_mtup_probe_success vs wrong snd_cwnd\n\nsyzbot got a new report [1] finally pointing to a very old bug,\nadded in initial support for MTU probing.\n\ntcp_mtu_probe() has checks about starting an MTU probe if\ntcp_snd_cwnd(tp) \u003e= 11.\n\nBut nothing prevents tcp_snd_cwnd(tp) to be reduced later\nand before the MTU probe succeeds.\n\nThis bug would lead to potential zero-divides.\n\nDebugging added in commit 40570375356c (\"tcp: add accessors\nto read/set tp-\u003esnd_cwnd\") has paid off :)\n\nWhile we are at it, address potential overflows in this code.\n\n[1]\nWARNING: CPU: 1 PID: 14132 at include/net/tcp.h:1219 tcp_mtup_probe_success+0x366/0x570 net/ipv4/tcp_input.c:2712\nModules linked in:\nCPU: 1 PID: 14132 Comm: syz-executor.2 Not tainted 5.18.0-syzkaller-07857-gbabf0bb978e3 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:tcp_snd_cwnd_set include/net/tcp.h:1219 [inline]\nRIP: 0010:tcp_mtup_probe_success+0x366/0x570 net/ipv4/tcp_input.c:2712\nCode: 74 08 48 89 ef e8 da 80 17 f9 48 8b 45 00 65 48 ff 80 80 03 00 00 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 aa b0 c5 f8 \u003c0f\u003e 0b e9 16 fe ff ff 48 8b 4c 24 08 80 e1 07 38 c1 0f 8c c7 fc ff\nRSP: 0018:ffffc900079e70f8 EFLAGS: 00010287\nRAX: ffffffff88c0f7f6 RBX: ffff8880756e7a80 RCX: 0000000000040000\nRDX: ffffc9000c6c4000 RSI: 0000000000031f9e RDI: 0000000000031f9f\nRBP: 0000000000000000 R08: ffffffff88c0f606 R09: ffffc900079e7520\nR10: ffffed101011226d R11: 1ffff1101011226c R12: 1ffff1100eadcf50\nR13: ffff8880756e72c0 R14: 1ffff1100eadcf89 R15: dffffc0000000000\nFS: 00007f643236e700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f1ab3f1e2a0 CR3: 0000000064fe7000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n tcp_clean_rtx_queue+0x223a/0x2da0 net/ipv4/tcp_input.c:3356\n tcp_ack+0x1962/0x3c90 net/ipv4/tcp_input.c:3861\n tcp_rcv_established+0x7c8/0x1ac0 net/ipv4/tcp_input.c:5973\n tcp_v6_do_rcv+0x57b/0x1210 net/ipv6/tcp_ipv6.c:1476\n sk_backlog_rcv include/net/sock.h:1061 [inline]\n __release_sock+0x1d8/0x4c0 net/core/sock.c:2849\n release_sock+0x5d/0x1c0 net/core/sock.c:3404\n sk_stream_wait_memory+0x700/0xdc0 net/core/stream.c:145\n tcp_sendmsg_locked+0x111d/0x3fc0 net/ipv4/tcp.c:1410\n tcp_sendmsg+0x2c/0x40 net/ipv4/tcp.c:1448\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg net/socket.c:734 [inline]\n __sys_sendto+0x439/0x5c0 net/socket.c:2119\n __do_sys_sendto net/socket.c:2131 [inline]\n __se_sys_sendto net/socket.c:2127 [inline]\n __x64_sys_sendto+0xda/0xf0 net/socket.c:2127\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7f6431289109\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f643236e168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f643139c100 RCX: 00007f6431289109\nRDX: 00000000d0d0c2ac RSI: 0000000020000080 RDI: 000000000000000a\nRBP: 00007f64312e308d R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fff372533af R14: 00007f643236e300 R15: 0000000000022000",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49330"
},
{
"category": "external",
"summary": "RHBZ#2348206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348206"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49330"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49330-199b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49330-199b@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd"
},
{
"cve": "CVE-2022-49333",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347763"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: E-Switch, pair only capable devices\n\nOFFLOADS paring using devcom is possible only on devices\nthat support LAG. Filter based on lag capabilities.\n\nThis fixes an issue where mlx5_get_next_phys_dev() was\ncalled without holding the interface lock.\n\nThis issue was found when commit\nbc4c2f2e0179 (\"net/mlx5: Lag, filter non compatible devices\")\nadded an assert that verifies the interface lock is held.\n\nWARNING: CPU: 9 PID: 1706 at drivers/net/ethernet/mellanox/mlx5/core/dev.c:642 mlx5_get_next_phys_dev+0xd2/0x100 [mlx5_core]\nModules linked in: mlx5_vdpa vringh vhost_iotlb vdpa mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_umad ib_ipoib ib_cm ib_uverbs ib_core overlay fuse [last unloaded: mlx5_core]\nCPU: 9 PID: 1706 Comm: devlink Not tainted 5.18.0-rc7+ #11\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:mlx5_get_next_phys_dev+0xd2/0x100 [mlx5_core]\nCode: 02 00 75 48 48 8b 85 80 04 00 00 5d c3 31 c0 5d c3 be ff ff ff ff 48 c7 c7 08 41 5b a0 e8 36 87 28 e3 85 c0 0f 85 6f ff ff ff \u003c0f\u003e 0b e9 68 ff ff ff 48 c7 c7 0c 91 cc 84 e8 cb 36 6f e1 e9 4d ff\nRSP: 0018:ffff88811bf47458 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff88811b398000 RCX: 0000000000000001\nRDX: 0000000080000000 RSI: ffffffffa05b4108 RDI: ffff88812daaaa78\nRBP: ffff88812d050380 R08: 0000000000000001 R09: ffff88811d6b3437\nR10: 0000000000000001 R11: 00000000fddd3581 R12: ffff88815238c000\nR13: ffff88812d050380 R14: ffff8881018aa7e0 R15: ffff88811d6b3428\nFS: 00007fc82e18ae80(0000) GS:ffff88842e080000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f9630d1b421 CR3: 0000000149802004 CR4: 0000000000370ea0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n mlx5_esw_offloads_devcom_event+0x99/0x3b0 [mlx5_core]\n mlx5_devcom_send_event+0x167/0x1d0 [mlx5_core]\n esw_offloads_enable+0x1153/0x1500 [mlx5_core]\n ? mlx5_esw_offloads_controller_valid+0x170/0x170 [mlx5_core]\n ? wait_for_completion_io_timeout+0x20/0x20\n ? mlx5_rescan_drivers_locked+0x318/0x810 [mlx5_core]\n mlx5_eswitch_enable_locked+0x586/0xc50 [mlx5_core]\n ? mlx5_eswitch_disable_pf_vf_vports+0x1d0/0x1d0 [mlx5_core]\n ? mlx5_esw_try_lock+0x1b/0xb0 [mlx5_core]\n ? mlx5_eswitch_enable+0x270/0x270 [mlx5_core]\n ? __debugfs_create_file+0x260/0x3e0\n mlx5_devlink_eswitch_mode_set+0x27e/0x870 [mlx5_core]\n ? mutex_lock_io_nested+0x12c0/0x12c0\n ? esw_offloads_disable+0x250/0x250 [mlx5_core]\n ? devlink_nl_cmd_trap_get_dumpit+0x470/0x470\n ? rcu_read_lock_sched_held+0x3f/0x70\n devlink_nl_cmd_eswitch_set_doit+0x217/0x620",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5: E-Switch, pair only capable devices",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49333"
},
{
"category": "external",
"summary": "RHBZ#2347763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347763"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49333"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49333-8ae3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49333-8ae3@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5: E-Switch, pair only capable devices"
},
{
"cve": "CVE-2022-49339",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348103"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv6: unexport __init-annotated seg6_hmac_init()\n\nEXPORT_SYMBOL and __init is a bad combination because the .init.text\nsection is freed up after the initialization. Hence, modules cannot\nuse symbols annotated __init. The access to a freed symbol may end up\nwith kernel panic.\n\nmodpost used to detect it, but it has been broken for a decade.\n\nRecently, I fixed modpost so it started to warn it again, then this\nshowed up in linux-next builds.\n\nThere are two ways to fix it:\n\n - Remove __init\n - Remove EXPORT_SYMBOL\n\nI chose the latter for this case because the caller (net/ipv6/seg6.c)\nand the callee (net/ipv6/seg6_hmac.c) belong to the same module.\nIt seems an internal function call in ipv6.ko.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ipv6: unexport __init-annotated seg6_hmac_init()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49339"
},
{
"category": "external",
"summary": "RHBZ#2348103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348103"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49339",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49339"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2022-49339-8220@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2022-49339-8220@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ipv6: unexport __init-annotated seg6_hmac_init()"
},
{
"cve": "CVE-2022-49365",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347917"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Off by one in dm_dmub_outbox1_low_irq()\n\nThe \u003e ARRAY_SIZE() should be \u003e= ARRAY_SIZE() to prevent an out of bounds\naccess.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49365"
},
{
"category": "external",
"summary": "RHBZ#2347917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49365"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2022-49365-37e7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2022-49365-37e7@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq()"
},
{
"cve": "CVE-2022-49371",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348122"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix deadlock in __device_attach\n\nIn __device_attach function, The lock holding logic is as follows:\n...\n__device_attach\ndevice_lock(dev) // get lock dev\n async_schedule_dev(__device_attach_async_helper, dev); // func\n async_schedule_node\n async_schedule_node_domain(func)\n entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);\n\t/* when fail or work limit, sync to execute func, but\n\t __device_attach_async_helper will get lock dev as\n\t well, which will lead to A-A deadlock. */\n\tif (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK) {\n\t func;\n\telse\n\t queue_work_node(node, system_unbound_wq, \u0026entry-\u003ework)\n device_unlock(dev)\n\nAs shown above, when it is allowed to do async probes, because of\nout of memory or work limit, async work is not allowed, to do\nsync execute instead. it will lead to A-A deadlock because of\n__device_attach_async_helper getting lock dev.\n\nTo fix the deadlock, move the async_schedule_dev outside device_lock,\nas we can see, in async_schedule_node_domain, the parameter of\nqueue_work_node is system_unbound_wq, so it can accept concurrent\noperations. which will also not change the code logic, and will\nnot lead to deadlock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: driver core: fix deadlock in __device_attach",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49371"
},
{
"category": "external",
"summary": "RHBZ#2348122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49371",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49371"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49371-30f9@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49371-30f9@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: driver core: fix deadlock in __device_attach"
},
{
"cve": "CVE-2022-49372",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348024"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: tcp_rtx_synack() can be called from process context\n\nLaurent reported the enclosed report [1]\n\nThis bug triggers with following coditions:\n\n0) Kernel built with CONFIG_DEBUG_PREEMPT=y\n\n1) A new passive FastOpen TCP socket is created.\n This FO socket waits for an ACK coming from client to be a complete\n ESTABLISHED one.\n2) A socket operation on this socket goes through lock_sock()\n release_sock() dance.\n3) While the socket is owned by the user in step 2),\n a retransmit of the SYN is received and stored in socket backlog.\n4) At release_sock() time, the socket backlog is processed while\n in process context.\n5) A SYNACK packet is cooked in response of the SYN retransmit.\n6) -\u003e tcp_rtx_synack() is called in process context.\n\nBefore blamed commit, tcp_rtx_synack() was always called from BH handler,\nfrom a timer handler.\n\nFix this by using TCP_INC_STATS() \u0026 NET_INC_STATS()\nwhich do not assume caller is in non preemptible context.\n\n[1]\nBUG: using __this_cpu_add() in preemptible [00000000] code: epollpep/2180\ncaller is tcp_rtx_synack.part.0+0x36/0xc0\nCPU: 10 PID: 2180 Comm: epollpep Tainted: G OE 5.16.0-0.bpo.4-amd64 #1 Debian 5.16.12-1~bpo11+1\nHardware name: Supermicro SYS-5039MC-H8TRF/X11SCD-F, BIOS 1.7 11/23/2021\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x48/0x5e\n check_preemption_disabled+0xde/0xe0\n tcp_rtx_synack.part.0+0x36/0xc0\n tcp_rtx_synack+0x8d/0xa0\n ? kmem_cache_alloc+0x2e0/0x3e0\n ? apparmor_file_alloc_security+0x3b/0x1f0\n inet_rtx_syn_ack+0x16/0x30\n tcp_check_req+0x367/0x610\n tcp_rcv_state_process+0x91/0xf60\n ? get_nohz_timer_target+0x18/0x1a0\n ? lock_timer_base+0x61/0x80\n ? preempt_count_add+0x68/0xa0\n tcp_v4_do_rcv+0xbd/0x270\n __release_sock+0x6d/0xb0\n release_sock+0x2b/0x90\n sock_setsockopt+0x138/0x1140\n ? __sys_getsockname+0x7e/0xc0\n ? aa_sk_perm+0x3e/0x1a0\n __sys_setsockopt+0x198/0x1e0\n __x64_sys_setsockopt+0x21/0x30\n do_syscall_64+0x38/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: tcp_rtx_synack() can be called from process context",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49372"
},
{
"category": "external",
"summary": "RHBZ#2348024",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348024"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49372",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49372"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49372-45e1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49372-45e1@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: tcp_rtx_synack() can be called from process context"
},
{
"cve": "CVE-2022-49376",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347964"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s SCSI subsystem. A NULL pointer dereference can be triggered when an error occurs before the sdkp-\u003edevice object is fully initialized, causing a system crash and a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: sd: Fix potential NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.8 and 9.2 via RHSA-2023:2951 [1] and RHSA-2023:2458 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2023:2951\n\n[2]. https://access.redhat.com/errata/RHSA-2023:2458",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49376"
},
{
"category": "external",
"summary": "RHBZ#2347964",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347964"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49376"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49376-9ec1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49376-9ec1@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: sd: Fix potential NULL pointer dereference"
},
{
"cve": "CVE-2022-49416",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347666"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix use-after-free in chanctx code\n\nIn ieee80211_vif_use_reserved_context(), when we have an\nold context and the new context\u0027s replace_state is set to\nIEEE80211_CHANCTX_REPLACE_NONE, we free the old context\nin ieee80211_vif_use_reserved_reassign(). Therefore, we\ncannot check the old_ctx anymore, so we should set it to\nNULL after this point.\n\nHowever, since the new_ctx replace state is clearly not\nIEEE80211_CHANCTX_REPLACES_OTHER, we\u0027re not going to do\nanything else in this function and can just return to\navoid accessing the freed old_ctx.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: fix use-after-free in chanctx code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49416"
},
{
"category": "external",
"summary": "RHBZ#2347666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347666"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49416",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49416"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49416",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49416"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49416-7c8e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49416-7c8e@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: fix use-after-free in chanctx code"
},
{
"cve": "CVE-2022-49429",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347775"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: Prevent panic when SDMA is disabled\n\nIf the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to\nhfi1_write_iter() will dereference a NULL pointer and panic. A typical\nstack frame is:\n\n sdma_select_user_engine [hfi1]\n hfi1_user_sdma_process_request [hfi1]\n hfi1_write_iter [hfi1]\n do_iter_readv_writev\n do_iter_write\n vfs_writev\n do_writev\n do_syscall_64\n\nThe fix is to test for SDMA in hfi1_write_iter() and fail the I/O with\nEINVAL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/hfi1: Prevent panic when SDMA is disabled",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49429"
},
{
"category": "external",
"summary": "RHBZ#2347775",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347775"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49429",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49429"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2022-49429-c9a7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2022-49429-c9a7@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/hfi1: Prevent panic when SDMA is disabled"
},
{
"cve": "CVE-2022-49471",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348322"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtw89: cfo: check mac_id to avoid out-of-bounds\n\nSomehow, hardware reports incorrect mac_id and pollute memory. Check index\nbefore we access the array.\n\n UBSAN: array-index-out-of-bounds in rtw89/phy.c:2517:23\n index 188 is out of range for type \u0027s32 [64]\u0027\n CPU: 1 PID: 51550 Comm: irq/35-rtw89_pc Tainted: G OE\n Call Trace:\n \u003cIRQ\u003e\n show_stack+0x52/0x58\n dump_stack_lvl+0x4c/0x63\n dump_stack+0x10/0x12\n ubsan_epilogue+0x9/0x45\n __ubsan_handle_out_of_bounds.cold+0x44/0x49\n ? __alloc_skb+0x92/0x1d0\n rtw89_phy_cfo_parse+0x44/0x7f [rtw89_core]\n rtw89_core_rx+0x261/0x871 [rtw89_core]\n ? __alloc_skb+0xee/0x1d0\n rtw89_pci_napi_poll+0x3fa/0x4ea [rtw89_pci]\n __napi_poll+0x33/0x1a0\n net_rx_action+0x126/0x260\n ? __queue_work+0x217/0x4c0\n __do_softirq+0xd9/0x315\n ? disable_irq_nosync+0x10/0x10\n do_softirq.part.0+0x6d/0x90\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n __local_bh_enable_ip+0x62/0x70\n rtw89_pci_interrupt_threadfn+0x182/0x1a6 [rtw89_pci]\n irq_thread_fn+0x28/0x60\n irq_thread+0xc8/0x190\n ? irq_thread_fn+0x60/0x60\n kthread+0x16b/0x190\n ? irq_thread_check_affinity+0xe0/0xe0\n ? set_kthread_struct+0x50/0x50\n ret_from_fork+0x22/0x30\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: rtw89: cfo: check mac_id to avoid out-of-bounds",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49471"
},
{
"category": "external",
"summary": "RHBZ#2348322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348322"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49471"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49471-4e82@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49471-4e82@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: rtw89: cfo: check mac_id to avoid out-of-bounds"
},
{
"cve": "CVE-2022-49511",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347746"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: defio: fix the pagelist corruption\n\nEasily hit the below list corruption:\n==\nlist_add corruption. prev-\u003enext should be next (ffffffffc0ceb090), but\nwas ffffec604507edc8. (prev=ffffec604507edc8).\nWARNING: CPU: 65 PID: 3959 at lib/list_debug.c:26\n__list_add_valid+0x53/0x80\nCPU: 65 PID: 3959 Comm: fbdev Tainted: G U\nRIP: 0010:__list_add_valid+0x53/0x80\nCall Trace:\n \u003cTASK\u003e\n fb_deferred_io_mkwrite+0xea/0x150\n do_page_mkwrite+0x57/0xc0\n do_wp_page+0x278/0x2f0\n __handle_mm_fault+0xdc2/0x1590\n handle_mm_fault+0xdd/0x2c0\n do_user_addr_fault+0x1d3/0x650\n exc_page_fault+0x77/0x180\n ? asm_exc_page_fault+0x8/0x30\n asm_exc_page_fault+0x1e/0x30\nRIP: 0033:0x7fd98fc8fad1\n==\n\nFigure out the race happens when one process is adding \u0026page-\u003elru into\nthe pagelist tail in fb_deferred_io_mkwrite(), another process is\nre-initializing the same \u0026page-\u003elru in fb_deferred_io_fault(), which is\nnot protected by the lock.\n\nThis fix is to init all the page lists one time during initialization,\nit not only fixes the list corruption, but also avoids INIT_LIST_HEAD()\nredundantly.\n\nV2: change \"int i\" to \"unsigned int i\" (Geert Uytterhoeven)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fbdev: defio: fix the pagelist corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49511"
},
{
"category": "external",
"summary": "RHBZ#2347746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347746"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49511",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49511"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49511-100a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49511-100a@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: fbdev: defio: fix the pagelist corruption"
},
{
"cve": "CVE-2022-49513",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348128"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s cpufreq subsystem. The `dbs_data` struct, which embeds a `kobject`, improperly attempts to free the struct using `kfree()` rather than through the proper `release()` method. This issue can lead to a use-after-free scenario, resulting in system instability, memory corruption, or potential arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cpufreq: governor: Use kobject release() method to free dbs_data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49513"
},
{
"category": "external",
"summary": "RHBZ#2348128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49513",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49513"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49513",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49513"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49513-f147@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49513-f147@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cpufreq: governor: Use kobject release() method to free dbs_data"
},
{
"cve": "CVE-2022-49519",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348111"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath10k: skip ath10k_halt during suspend for driver state RESTARTING\n\nDouble free crash is observed when FW recovery(caused by wmi\ntimeout/crash) is followed by immediate suspend event. The FW recovery\nis triggered by ath10k_core_restart() which calls driver clean up via\nath10k_halt(). When the suspend event occurs between the FW recovery,\nthe restart worker thread is put into frozen state until suspend completes.\nThe suspend event triggers ath10k_stop() which again triggers ath10k_halt()\nThe double invocation of ath10k_halt() causes ath10k_htt_rx_free() to be\ncalled twice(Note: ath10k_htt_rx_alloc was not called by restart worker\nthread because of its frozen state), causing the crash.\n\nTo fix this, during the suspend flow, skip call to ath10k_halt() in\nath10k_stop() when the current driver state is ATH10K_STATE_RESTARTING.\nAlso, for driver state ATH10K_STATE_RESTARTING, call\nath10k_wait_for_suspend() in ath10k_stop(). This is because call to\nath10k_wait_for_suspend() is skipped later in\n[ath10k_halt() \u003e ath10k_core_stop()] for the driver state\nATH10K_STATE_RESTARTING.\n\nThe frozen restart worker thread will be cancelled during resume when the\ndevice comes out of suspend.\n\nBelow is the crash stack for reference:\n\n[ 428.469167] ------------[ cut here ]------------\n[ 428.469180] kernel BUG at mm/slub.c:4150!\n[ 428.469193] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 428.469219] Workqueue: events_unbound async_run_entry_fn\n[ 428.469230] RIP: 0010:kfree+0x319/0x31b\n[ 428.469241] RSP: 0018:ffffa1fac015fc30 EFLAGS: 00010246\n[ 428.469247] RAX: ffffedb10419d108 RBX: ffff8c05262b0000\n[ 428.469252] RDX: ffff8c04a8c07000 RSI: 0000000000000000\n[ 428.469256] RBP: ffffa1fac015fc78 R08: 0000000000000000\n[ 428.469276] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 428.469285] Call Trace:\n[ 428.469295] ? dma_free_attrs+0x5f/0x7d\n[ 428.469320] ath10k_core_stop+0x5b/0x6f\n[ 428.469336] ath10k_halt+0x126/0x177\n[ 428.469352] ath10k_stop+0x41/0x7e\n[ 428.469387] drv_stop+0x88/0x10e\n[ 428.469410] __ieee80211_suspend+0x297/0x411\n[ 428.469441] rdev_suspend+0x6e/0xd0\n[ 428.469462] wiphy_suspend+0xb1/0x105\n[ 428.469483] ? name_show+0x2d/0x2d\n[ 428.469490] dpm_run_callback+0x8c/0x126\n[ 428.469511] ? name_show+0x2d/0x2d\n[ 428.469517] __device_suspend+0x2e7/0x41b\n[ 428.469523] async_suspend+0x1f/0x93\n[ 428.469529] async_run_entry_fn+0x3d/0xd1\n[ 428.469535] process_one_work+0x1b1/0x329\n[ 428.469541] worker_thread+0x213/0x372\n[ 428.469547] kthread+0x150/0x15f\n[ 428.469552] ? pr_cont_work+0x58/0x58\n[ 428.469558] ? kthread_blkcg+0x31/0x31\n\nTested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel (ath10k): Double free vulnerability during suspend/resume",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49519"
},
{
"category": "external",
"summary": "RHBZ#2348111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49519"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49519-3b0d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49519-3b0d@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel (ath10k): Double free vulnerability during suspend/resume"
},
{
"cve": "CVE-2022-49539",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347661"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtw89: ser: fix CAM leaks occurring in L2 reset\n\nThe CAM, meaning address CAM and bssid CAM here, will get leaks during\nSER (system error recover) L2 reset process and ieee80211_restart_hw()\nwhich is called by L2 reset process eventually.\n\nThe normal flow would be like\n-\u003e add interface (acquire 1)\n-\u003e enter ips (release 1)\n-\u003e leave ips (acquire 1)\n-\u003e connection (occupy 1) \u003c(A) 1 leak after L2 reset if non-sec connection\u003e\n\nThe ieee80211_restart_hw() flow (under connection)\n-\u003e ieee80211 reconfig\n-\u003e add interface (acquire 1)\n-\u003e leave ips (acquire 1)\n-\u003e connection (occupy (A) + 2) \u003c(B) 1 more leak\u003e\n\nOriginally, CAM is released before HW restart only if connection is under\nsecurity. Now, release CAM whatever connection it is to fix leak in (A).\nOTOH, check if CAM is already valid to avoid acquiring multiple times to\nfix (B).\n\nBesides, if AP mode, release address CAM of all stations before HW restart.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: rtw89: ser: fix CAM leaks occurring in L2 reset",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49539"
},
{
"category": "external",
"summary": "RHBZ#2347661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347661"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49539",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49539"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49539-9ea2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49539-9ea2@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: rtw89: ser: fix CAM leaks occurring in L2 reset"
},
{
"cve": "CVE-2022-49545",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348289"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Cancel pending work at closing a MIDI substream\n\nAt closing a USB MIDI output substream, there might be still a pending\nwork, which would eventually access the rawmidi runtime object that is\nbeing released. For fixing the race, make sure to cancel the pending\nwork at closing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ALSA: usb-audio: Cancel pending work at closing a MIDI substream",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49545"
},
{
"category": "external",
"summary": "RHBZ#2348289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49545"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022615-CVE-2022-49545-4e81@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022615-CVE-2022-49545-4e81@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ALSA: usb-audio: Cancel pending work at closing a MIDI substream"
},
{
"cve": "CVE-2022-49577",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348255"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Fix a data-race around sysctl_udp_l3mdev_accept.\n\nWhile reading sysctl_udp_l3mdev_accept, it can be changed concurrently.\nThus, we need to add READ_ONCE() to its reader.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The bug is that during reading of the variable net-\u003eipv4.sysctl_udp_l3mdev_accept potentially could read incorrect value if race happens (if simultaneously value of this variable being changed). Since corruption could happen only during reading and value of variable itself not corrupted and very complex or impossible to trigger the bug, the security impact is limited. Only root user or other privileged user can change value of this variable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49577"
},
{
"category": "external",
"summary": "RHBZ#2348255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49577",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49577"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49577-da62@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49577-da62@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept."
},
{
"cve": "CVE-2022-49583",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348151"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix handling of dummy receive descriptors\n\nFix memory leak caused by not handling dummy receive descriptor properly.\niavf_get_rx_buffer now sets the rx_buffer return value for dummy receive\ndescriptors. Without this patch, when the hardware writes a dummy\ndescriptor, iavf would not free the page allocated for the previous receive\nbuffer. This is an unlikely event but can still happen.\n\n[Jesse: massaged commit message]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iavf: Fix handling of dummy receive descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49583"
},
{
"category": "external",
"summary": "RHBZ#2348151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49583",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49583"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49583-d8d5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49583-d8d5@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iavf: Fix handling of dummy receive descriptors"
},
{
"cve": "CVE-2022-49592",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347803"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix dma queue left shift overflow issue\n\nWhen queue number is \u003e 4, left shift overflows due to 32 bits\ninteger variable. Mask calculation is wrong for MTL_RXQ_DMA_MAP1.\n\nIf CONFIG_UBSAN is enabled, kernel dumps below warning:\n[ 10.363842] ==================================================================\n[ 10.363882] UBSAN: shift-out-of-bounds in /build/linux-intel-iotg-5.15-8e6Tf4/\nlinux-intel-iotg-5.15-5.15.0/drivers/net/ethernet/stmicro/stmmac/dwmac4_core.c:224:12\n[ 10.363929] shift exponent 40 is too large for 32-bit type \u0027unsigned int\u0027\n[ 10.363953] CPU: 1 PID: 599 Comm: NetworkManager Not tainted 5.15.0-1003-intel-iotg\n[ 10.363956] Hardware name: ADLINK Technology Inc. LEC-EL/LEC-EL, BIOS 0.15.11 12/22/2021\n[ 10.363958] Call Trace:\n[ 10.363960] \u003cTASK\u003e\n[ 10.363963] dump_stack_lvl+0x4a/0x5f\n[ 10.363971] dump_stack+0x10/0x12\n[ 10.363974] ubsan_epilogue+0x9/0x45\n[ 10.363976] __ubsan_handle_shift_out_of_bounds.cold+0x61/0x10e\n[ 10.363979] ? wake_up_klogd+0x4a/0x50\n[ 10.363983] ? vprintk_emit+0x8f/0x240\n[ 10.363986] dwmac4_map_mtl_dma.cold+0x42/0x91 [stmmac]\n[ 10.364001] stmmac_mtl_configuration+0x1ce/0x7a0 [stmmac]\n[ 10.364009] ? dwmac410_dma_init_channel+0x70/0x70 [stmmac]\n[ 10.364020] stmmac_hw_setup.cold+0xf/0xb14 [stmmac]\n[ 10.364030] ? page_pool_alloc_pages+0x4d/0x70\n[ 10.364034] ? stmmac_clear_tx_descriptors+0x6e/0xe0 [stmmac]\n[ 10.364042] stmmac_open+0x39e/0x920 [stmmac]\n[ 10.364050] __dev_open+0xf0/0x1a0\n[ 10.364054] __dev_change_flags+0x188/0x1f0\n[ 10.364057] dev_change_flags+0x26/0x60\n[ 10.364059] do_setlink+0x908/0xc40\n[ 10.364062] ? do_setlink+0xb10/0xc40\n[ 10.364064] ? __nla_validate_parse+0x4c/0x1a0\n[ 10.364068] __rtnl_newlink+0x597/0xa10\n[ 10.364072] ? __nla_reserve+0x41/0x50\n[ 10.364074] ? __kmalloc_node_track_caller+0x1d0/0x4d0\n[ 10.364079] ? pskb_expand_head+0x75/0x310\n[ 10.364082] ? nla_reserve_64bit+0x21/0x40\n[ 10.364086] ? skb_free_head+0x65/0x80\n[ 10.364089] ? security_sock_rcv_skb+0x2c/0x50\n[ 10.364094] ? __cond_resched+0x19/0x30\n[ 10.364097] ? kmem_cache_alloc_trace+0x15a/0x420\n[ 10.364100] rtnl_newlink+0x49/0x70\n\nThis change fixes MTL_RXQ_DMA_MAP1 mask issue and channel/queue\nmapping warning.\n\nBugLink: https://bugzilla.kernel.org/show_bug.cgi?id=216195",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: stmmac: fix dma queue left shift overflow issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49592"
},
{
"category": "external",
"summary": "RHBZ#2347803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49592"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49592-f07c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49592-f07c@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: net: stmmac: fix dma queue left shift overflow issue"
},
{
"cve": "CVE-2022-49636",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347709"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvlan: fix memory leak in vlan_newlink()\n\nBlamed commit added back a bug I fixed in commit 9bbd917e0bec\n(\"vlan: fix memory leak in vlan_dev_set_egress_priority\")\n\nIf a memory allocation fails in vlan_changelink() after other allocations\nsucceeded, we need to call vlan_dev_free_egress_priority()\nto free all allocated memory because after a failed -\u003enewlink()\nwe do not call any methods like ndo_uninit() or dev-\u003epriv_destructor().\n\nIn following example, if the allocation for last element 2000:2001 fails,\nwe need to free eight prior allocations:\n\nip link add link dummy0 dummy0.100 type vlan id 100 \\\n\tegress-qos-map 1:2 2:3 3:4 4:5 5:6 6:7 7:8 8:9 2000:2001\n\nsyzbot report was:\n\nBUG: memory leak\nunreferenced object 0xffff888117bd1060 (size 32):\ncomm \"syz-executor408\", pid 3759, jiffies 4294956555 (age 34.090s)\nhex dump (first 32 bytes):\n09 00 00 00 00 a0 00 00 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\nbacktrace:\n[\u003cffffffff83fc60ad\u003e] kmalloc include/linux/slab.h:600 [inline]\n[\u003cffffffff83fc60ad\u003e] vlan_dev_set_egress_priority+0xed/0x170 net/8021q/vlan_dev.c:193\n[\u003cffffffff83fc6628\u003e] vlan_changelink+0x178/0x1d0 net/8021q/vlan_netlink.c:128\n[\u003cffffffff83fc67c8\u003e] vlan_newlink+0x148/0x260 net/8021q/vlan_netlink.c:185\n[\u003cffffffff838b1278\u003e] rtnl_newlink_create net/core/rtnetlink.c:3363 [inline]\n[\u003cffffffff838b1278\u003e] __rtnl_newlink+0xa58/0xdc0 net/core/rtnetlink.c:3580\n[\u003cffffffff838b1629\u003e] rtnl_newlink+0x49/0x70 net/core/rtnetlink.c:3593\n[\u003cffffffff838ac66c\u003e] rtnetlink_rcv_msg+0x21c/0x5c0 net/core/rtnetlink.c:6089\n[\u003cffffffff839f9c37\u003e] netlink_rcv_skb+0x87/0x1d0 net/netlink/af_netlink.c:2501\n[\u003cffffffff839f8da7\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n[\u003cffffffff839f8da7\u003e] netlink_unicast+0x397/0x4c0 net/netlink/af_netlink.c:1345\n[\u003cffffffff839f9266\u003e] netlink_sendmsg+0x396/0x710 net/netlink/af_netlink.c:1921\n[\u003cffffffff8384dbf6\u003e] sock_sendmsg_nosec net/socket.c:714 [inline]\n[\u003cffffffff8384dbf6\u003e] sock_sendmsg+0x56/0x80 net/socket.c:734\n[\u003cffffffff8384e15c\u003e] ____sys_sendmsg+0x36c/0x390 net/socket.c:2488\n[\u003cffffffff838523cb\u003e] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2542\n[\u003cffffffff838525b8\u003e] __sys_sendmsg net/socket.c:2571 [inline]\n[\u003cffffffff838525b8\u003e] __do_sys_sendmsg net/socket.c:2580 [inline]\n[\u003cffffffff838525b8\u003e] __se_sys_sendmsg net/socket.c:2578 [inline]\n[\u003cffffffff838525b8\u003e] __x64_sys_sendmsg+0x78/0xf0 net/socket.c:2578\n[\u003cffffffff845ad8d5\u003e] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n[\u003cffffffff845ad8d5\u003e] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n[\u003cffffffff8460006a\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vlan: fix memory leak in vlan_newlink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49636"
},
{
"category": "external",
"summary": "RHBZ#2347709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49636"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49636-b283@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49636-b283@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vlan: fix memory leak in vlan_newlink()"
},
{
"cve": "CVE-2022-49642",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348085"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: dwc-qos: Disable split header for Tegra194\n\nThere is a long-standing issue with the Synopsys DWC Ethernet driver\nfor Tegra194 where random system crashes have been observed [0]. The\nproblem occurs when the split header feature is enabled in the stmmac\ndriver. In the bad case, a larger than expected buffer length is\nreceived and causes the calculation of the total buffer length to\noverflow. This results in a very large buffer length that causes the\nkernel to crash. Why this larger buffer length is received is not clear,\nhowever, the feedback from the NVIDIA design team is that the split\nheader feature is not supported for Tegra194. Therefore, disable split\nheader support for Tegra194 to prevent these random crashes from\noccurring.\n\n[0] https://lore.kernel.org/linux-tegra/b0b17697-f23e-8fa5-3757-604a86f3a095@nvidia.com/",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: stmmac: dwc-qos: Disable split header for Tegra194",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49642"
},
{
"category": "external",
"summary": "RHBZ#2348085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49642"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49642-dbbe@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49642-dbbe@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: stmmac: dwc-qos: Disable split header for Tegra194"
},
{
"cve": "CVE-2022-49644",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348280"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()\n\nIf drm_connector_init fails, intel_connector_free will be called to take\ncare of proper free. So it is necessary to drop the refcount of port\nbefore intel_connector_free.\n\n(cherry picked from commit cea9ed611e85d36a05db52b6457bf584b7d969e2)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49644"
},
{
"category": "external",
"summary": "RHBZ#2348280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348280"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49644"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49644",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49644"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49644-e3b0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49644-e3b0@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()"
},
{
"cve": "CVE-2022-49646",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348256"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix queue selection for mesh/OCB interfaces\n\nWhen using iTXQ, the code assumes that there is only one vif queue for\nbroadcast packets, using the BE queue. Allowing non-BE queue marking\nviolates that assumption and txq-\u003eac == skb_queue_mapping is no longer\nguaranteed. This can cause issues with queue handling in the driver and\nalso causes issues with the recent ATF change, resulting in an AQL\nunderflow warning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: fix queue selection for mesh/OCB interfaces",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49646"
},
{
"category": "external",
"summary": "RHBZ#2348256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49646"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49646-248b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49646-248b@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: fix queue selection for mesh/OCB interfaces"
},
{
"cve": "CVE-2022-49653",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348147"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: piix4: Fix a memory leak in the EFCH MMIO support\n\nThe recently added support for EFCH MMIO regions introduced a memory\nleak in that code path. The leak is caused by the fact that\nrelease_resource() merely removes the resource from the tree but does\nnot free its memory. We need to call release_mem_region() instead,\nwhich does free the memory. As a nice side effect, this brings back\nsome symmetry between the legacy and MMIO paths.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49653"
},
{
"category": "external",
"summary": "RHBZ#2348147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348147"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49653",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49653"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022620-CVE-2022-49653-f6b6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022620-CVE-2022-49653-f6b6@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support"
},
{
"cve": "CVE-2022-49663",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347767"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntunnels: do not assume mac header is set in skb_tunnel_check_pmtu()\n\nRecently added debug in commit f9aefd6b2aa3 (\"net: warn if mac header\nwas not set\") caught a bug in skb_tunnel_check_pmtu(), as shown\nin this syzbot report [1].\n\nIn ndo_start_xmit() paths, there is really no need to use skb-\u003emac_header,\nbecause skb-\u003edata is supposed to point at it.\n\n[1] WARNING: CPU: 1 PID: 8604 at include/linux/skbuff.h:2784 skb_mac_header_len include/linux/skbuff.h:2784 [inline]\nWARNING: CPU: 1 PID: 8604 at include/linux/skbuff.h:2784 skb_tunnel_check_pmtu+0x5de/0x2f90 net/ipv4/ip_tunnel_core.c:413\nModules linked in:\nCPU: 1 PID: 8604 Comm: syz-executor.3 Not tainted 5.19.0-rc2-syzkaller-00443-g8720bd951b8e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:skb_mac_header_len include/linux/skbuff.h:2784 [inline]\nRIP: 0010:skb_tunnel_check_pmtu+0x5de/0x2f90 net/ipv4/ip_tunnel_core.c:413\nCode: 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 80 3c 02 00 0f 84 b9 fe ff ff 4c 89 ff e8 7c 0f d7 f9 e9 ac fe ff ff e8 c2 13 8a f9 \u003c0f\u003e 0b e9 28 fc ff ff e8 b6 13 8a f9 48 8b 54 24 70 48 b8 00 00 00\nRSP: 0018:ffffc90002e4f520 EFLAGS: 00010212\nRAX: 0000000000000324 RBX: ffff88804d5fd500 RCX: ffffc90005b52000\nRDX: 0000000000040000 RSI: ffffffff87f05e3e RDI: 0000000000000003\nRBP: ffffc90002e4f650 R08: 0000000000000003 R09: 000000000000ffff\nR10: 000000000000ffff R11: 0000000000000000 R12: 000000000000ffff\nR13: 0000000000000000 R14: 000000000000ffcd R15: 000000000000001f\nFS: 00007f3babba9700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000075319000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\ngeneve_xmit_skb drivers/net/geneve.c:927 [inline]\ngeneve_xmit+0xcf8/0x35d0 drivers/net/geneve.c:1107\n__netdev_start_xmit include/linux/netdevice.h:4805 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4819 [inline]\n__dev_direct_xmit+0x500/0x730 net/core/dev.c:4309\ndev_direct_xmit include/linux/netdevice.h:3007 [inline]\npacket_direct_xmit+0x1b8/0x2c0 net/packet/af_packet.c:282\npacket_snd net/packet/af_packet.c:3073 [inline]\npacket_sendmsg+0x21f4/0x55d0 net/packet/af_packet.c:3104\nsock_sendmsg_nosec net/socket.c:714 [inline]\nsock_sendmsg+0xcf/0x120 net/socket.c:734\n____sys_sendmsg+0x6eb/0x810 net/socket.c:2489\n___sys_sendmsg+0xf3/0x170 net/socket.c:2543\n__sys_sendmsg net/socket.c:2572 [inline]\n__do_sys_sendmsg net/socket.c:2581 [inline]\n__se_sys_sendmsg net/socket.c:2579 [inline]\n__x64_sys_sendmsg+0x132/0x220 net/socket.c:2579\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7f3baaa89109\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f3babba9168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f3baab9bf60 RCX: 00007f3baaa89109\nRDX: 0000000000000000 RSI: 0000000020000a00 RDI: 0000000000000003\nRBP: 00007f3baaae305d R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007ffe74f2543f R14: 00007f3babba9300 R15: 0000000000022000\n\u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49663"
},
{
"category": "external",
"summary": "RHBZ#2347767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49663"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49663-2213@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49663-2213@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()"
},
{
"cve": "CVE-2022-49691",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348166"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerspan: do not assume transport header is always set\n\nRewrite tests in ip6erspan_tunnel_xmit() and\nerspan_fb_xmit() to not assume transport header is set.\n\nsyzbot reported:\n\nWARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 skb_transport_header include/linux/skbuff.h:2911 [inline]\nWARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963\nModules linked in:\nCPU: 0 PID: 1350 Comm: aoe_tx0 Not tainted 5.19.0-rc2-syzkaller-00160-g274295c6e53f #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nRIP: 0010:skb_transport_header include/linux/skbuff.h:2911 [inline]\nRIP: 0010:ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963\nCode: 0f 47 f0 40 88 b5 7f fe ff ff e8 8c 16 4b f9 89 de bf ff ff ff ff e8 a0 12 4b f9 66 83 fb ff 0f 85 1d f1 ff ff e8 71 16 4b f9 \u003c0f\u003e 0b e9 43 f0 ff ff e8 65 16 4b f9 48 8d 85 30 ff ff ff ba 60 00\nRSP: 0018:ffffc90005daf910 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 000000000000ffff RCX: 0000000000000000\nRDX: ffff88801f032100 RSI: ffffffff882e8d3f RDI: 0000000000000003\nRBP: ffffc90005dafab8 R08: 0000000000000003 R09: 000000000000ffff\nR10: 000000000000ffff R11: 0000000000000000 R12: ffff888024f21d40\nR13: 000000000000a288 R14: 00000000000000b0 R15: ffff888025a2e000\nFS: 0000000000000000(0000) GS:ffff88802c800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b2e425000 CR3: 000000006d099000 CR4: 0000000000152ef0\nCall Trace:\n\u003cTASK\u003e\n__netdev_start_xmit include/linux/netdevice.h:4805 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4819 [inline]\nxmit_one net/core/dev.c:3588 [inline]\ndev_hard_start_xmit+0x188/0x880 net/core/dev.c:3604\nsch_direct_xmit+0x19f/0xbe0 net/sched/sch_generic.c:342\n__dev_xmit_skb net/core/dev.c:3815 [inline]\n__dev_queue_xmit+0x14a1/0x3900 net/core/dev.c:4219\ndev_queue_xmit include/linux/netdevice.h:2994 [inline]\ntx+0x6a/0xc0 drivers/block/aoe/aoenet.c:63\nkthread+0x1e7/0x3b0 drivers/block/aoe/aoecmd.c:1229\nkthread+0x2e9/0x3a0 kernel/kthread.c:376\nret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302\n\u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: erspan: do not assume transport header is always set",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49691"
},
{
"category": "external",
"summary": "RHBZ#2348166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49691"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022627-CVE-2022-49691-004b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022627-CVE-2022-49691-004b@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: erspan: do not assume transport header is always set"
},
{
"cve": "CVE-2022-49723",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347749"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/reset: Fix error_state_read ptr + offset use\n\nFix our pointer offset usage in error_state_read\nwhen there is no i915_gpu_coredump but buf offset\nis non-zero.\n\nThis fixes a kernel page fault can happen when\nmultiple tests are running concurrently in a loop\nand one is producing engine resets and consuming\nthe i915 error_state dump while the other is\nforcing full GT resets. (takes a while to trigger).\n\nThe dmesg call trace:\n\n[ 5590.803000] BUG: unable to handle page fault for address:\n ffffffffa0b0e000\n[ 5590.803009] #PF: supervisor read access in kernel mode\n[ 5590.803013] #PF: error_code(0x0000) - not-present page\n[ 5590.803016] PGD 5814067 P4D 5814067 PUD 5815063 PMD 109de4067\n PTE 0\n[ 5590.803022] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 5590.803026] CPU: 5 PID: 13656 Comm: i915_hangman Tainted: G U\n 5.17.0-rc5-ups69-guc-err-capt-rev6+ #136\n[ 5590.803033] Hardware name: Intel Corporation Alder Lake Client\n Platform/AlderLake-M LP4x RVP, BIOS ADLPFWI1.R00.\n 3031.A02.2201171222\t01/17/2022\n[ 5590.803039] RIP: 0010:memcpy_erms+0x6/0x10\n[ 5590.803045] Code: fe ff ff cc eb 1e 0f 1f 00 48 89 f8 48 89 d1\n 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3\n 66 0f 1f 44 00 00 48 89 f8 48 89 d1 \u003cf3\u003e a4\n c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20\n 72 7e 40 38 fe\n[ 5590.803054] RSP: 0018:ffffc90003a8fdf0 EFLAGS: 00010282\n[ 5590.803057] RAX: ffff888107ee9000 RBX: ffff888108cb1a00\n RCX: 0000000000000f8f\n[ 5590.803061] RDX: 0000000000001000 RSI: ffffffffa0b0e000\n RDI: ffff888107ee9071\n[ 5590.803065] RBP: 0000000000000000 R08: 0000000000000001\n R09: 0000000000000001\n[ 5590.803069] R10: 0000000000000001 R11: 0000000000000002\n R12: 0000000000000019\n[ 5590.803073] R13: 0000000000174fff R14: 0000000000001000\n R15: ffff888107ee9000\n[ 5590.803077] FS: 00007f62a99bee80(0000) GS:ffff88849f880000(0000)\n knlGS:0000000000000000\n[ 5590.803082] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 5590.803085] CR2: ffffffffa0b0e000 CR3: 000000010a1a8004\n CR4: 0000000000770ee0\n[ 5590.803089] PKRU: 55555554\n[ 5590.803091] Call Trace:\n[ 5590.803093] \u003cTASK\u003e\n[ 5590.803096] error_state_read+0xa1/0xd0 [i915]\n[ 5590.803175] kernfs_fop_read_iter+0xb2/0x1b0\n[ 5590.803180] new_sync_read+0x116/0x1a0\n[ 5590.803185] vfs_read+0x114/0x1b0\n[ 5590.803189] ksys_read+0x63/0xe0\n[ 5590.803193] do_syscall_64+0x38/0xc0\n[ 5590.803197] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 5590.803201] RIP: 0033:0x7f62aaea5912\n[ 5590.803204] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 5a b9 0c 00 e8 05\n 19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25\n 18 00 00 00 85 c0 75 10 0f 05 \u003c48\u003e 3d 00 f0 ff\n ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24\n[ 5590.803213] RSP: 002b:00007fff5b659ae8 EFLAGS: 00000246\n ORIG_RAX: 0000000000000000\n[ 5590.803218] RAX: ffffffffffffffda RBX: 0000000000100000\n RCX: 00007f62aaea5912\n[ 5590.803221] RDX: 000000000008b000 RSI: 00007f62a8c4000f\n RDI: 0000000000000006\n[ 5590.803225] RBP: 00007f62a8bcb00f R08: 0000000000200010\n R09: 0000000000101000\n[ 5590.803229] R10: 0000000000000001 R11: 0000000000000246\n R12: 0000000000000006\n[ 5590.803233] R13: 0000000000075000 R14: 00007f62a8acb010\n R15: 0000000000200000\n[ 5590.803238] \u003c/TASK\u003e\n[ 5590.803240] Modules linked in: i915 ttm drm_buddy drm_dp_helper\n drm_kms_helper syscopyarea sysfillrect sysimgblt\n fb_sys_fops prime_numbers nfnetlink br_netfilter\n overlay mei_pxp mei_hdcp x86_pkg_temp_thermal\n coretemp kvm_intel snd_hda_codec_hdmi snd_hda_intel\n \n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/i915/reset: Fix error_state_read ptr + offset use",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49723"
},
{
"category": "external",
"summary": "RHBZ#2347749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49723",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49723"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49723-ac32@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49723-ac32@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/i915/reset: Fix error_state_read ptr + offset use"
},
{
"cve": "CVE-2022-49726",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347948"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclocksource: hyper-v: unexport __init-annotated hv_init_clocksource()\n\nEXPORT_SYMBOL and __init is a bad combination because the .init.text\nsection is freed up after the initialization. Hence, modules cannot\nuse symbols annotated __init. The access to a freed symbol may end up\nwith kernel panic.\n\nmodpost used to detect it, but it has been broken for a decade.\n\nRecently, I fixed modpost so it started to warn it again, then this\nshowed up in linux-next builds.\n\nThere are two ways to fix it:\n\n - Remove __init\n - Remove EXPORT_SYMBOL\n\nI chose the latter for this case because the only in-tree call-site,\narch/x86/kernel/cpu/mshyperv.c is never compiled as modular.\n(CONFIG_HYPERVISOR_GUEST is boolean)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49726"
},
{
"category": "external",
"summary": "RHBZ#2347948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49726"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49726-582f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49726-582f@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()"
},
{
"cve": "CVE-2022-49732",
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348409"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsock: redo the psock vs ULP protection check\n\nCommit 8a59f9d1e3d4 (\"sock: Introduce sk-\u003esk_prot-\u003epsock_update_sk_prot()\")\nhas moved the inet_csk_has_ulp(sk) check from sk_psock_init() to\nthe new tcp_bpf_update_proto() function. I\u0027m guessing that this\nwas done to allow creating psocks for non-inet sockets.\n\nUnfortunately the destruction path for psock includes the ULP\nunwind, so we need to fail the sk_psock_init() itself.\nOtherwise if ULP is already present we\u0027ll notice that later,\nand call tcp_update_ulp() with the sk_proto of the ULP\nitself, which will most likely result in the ULP looping\nits callbacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sock: redo the psock vs ULP protection check",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49732"
},
{
"category": "external",
"summary": "RHBZ#2348409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49732"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49732-fc0d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49732-fc0d@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sock: redo the psock vs ULP protection check"
},
{
"cve": "CVE-2022-49872",
"discovery_date": "2025-05-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2363447"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gso: fix panic on frag_list with mixed head alloc types\n\nSince commit 3dcbdb134f32 (\"net: gso: Fix skb_segment splat when\nsplitting gso_size mangled skb having linear-headed frag_list\"), it is\nallowed to change gso_size of a GRO packet. However, that commit assumes\nthat \"checking the first list_skb member suffices; i.e if either of the\nlist_skb members have non head_frag head, then the first one has too\".\n\nIt turns out this assumption does not hold. We\u0027ve seen BUG_ON being hit\nin skb_segment when skbs on the frag_list had differing head_frag with\nthe vmxnet3 driver. This happens because __netdev_alloc_skb and\n__napi_alloc_skb can return a skb that is page backed or kmalloced\ndepending on the requested size. As the result, the last small skb in\nthe GRO packet can be kmalloced.\n\nThere are three different locations where this can be fixed:\n\n(1) We could check head_frag in GRO and not allow GROing skbs with\n different head_frag. However, that would lead to performance\n regression on normal forward paths with unmodified gso_size, where\n !head_frag in the last packet is not a problem.\n\n(2) Set a flag in bpf_skb_net_grow and bpf_skb_net_shrink indicating\n that NETIF_F_SG is undesirable. That would need to eat a bit in\n sk_buff. Furthermore, that flag can be unset when all skbs on the\n frag_list are page backed. To retain good performance,\n bpf_skb_net_grow/shrink would have to walk the frag_list.\n\n(3) Walk the frag_list in skb_segment when determining whether\n NETIF_F_SG should be cleared. This of course slows things down.\n\nThis patch implements (3). To limit the performance impact in\nskb_segment, the list is walked only for skbs with SKB_GSO_DODGY set\nthat have gso_size changed. Normal paths thus will not hit it.\n\nWe could check only the last skb but since we need to walk the whole\nlist anyway, let\u0027s stay on the safe side.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: gso: fix panic on frag_list with mixed head alloc types",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49872"
},
{
"category": "external",
"summary": "RHBZ#2363447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49872"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025050151-CVE-2022-49872-0c67@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025050151-CVE-2022-49872-0c67@gregkh/T"
}
],
"release_date": "2025-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: gso: fix panic on frag_list with mixed head alloc types"
},
{
"cve": "CVE-2022-49908",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-05-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2363373"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix memory leak in vhci_write\n\nSyzkaller reports a memory leak as follows:\n====================================\nBUG: memory leak\nunreferenced object 0xffff88810d81ac00 (size 240):\n [...]\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff838733d9\u003e] __alloc_skb+0x1f9/0x270 net/core/skbuff.c:418\n [\u003cffffffff833f742f\u003e] alloc_skb include/linux/skbuff.h:1257 [inline]\n [\u003cffffffff833f742f\u003e] bt_skb_alloc include/net/bluetooth/bluetooth.h:469 [inline]\n [\u003cffffffff833f742f\u003e] vhci_get_user drivers/bluetooth/hci_vhci.c:391 [inline]\n [\u003cffffffff833f742f\u003e] vhci_write+0x5f/0x230 drivers/bluetooth/hci_vhci.c:511\n [\u003cffffffff815e398d\u003e] call_write_iter include/linux/fs.h:2192 [inline]\n [\u003cffffffff815e398d\u003e] new_sync_write fs/read_write.c:491 [inline]\n [\u003cffffffff815e398d\u003e] vfs_write+0x42d/0x540 fs/read_write.c:578\n [\u003cffffffff815e3cdd\u003e] ksys_write+0x9d/0x160 fs/read_write.c:631\n [\u003cffffffff845e0645\u003e] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n [\u003cffffffff845e0645\u003e] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n [\u003cffffffff84600087\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n====================================\n\nHCI core will uses hci_rx_work() to process frame, which is queued to\nthe hdev-\u003erx_q tail in hci_recv_frame() by HCI driver.\n\nYet the problem is that, HCI core may not free the skb after handling\nACL data packets. To be more specific, when start fragment does not\ncontain the L2CAP length, HCI core just copies skb into conn-\u003erx_skb and\nfinishes frame process in l2cap_recv_acldata(), without freeing the skb,\nwhich triggers the above memory leak.\n\nThis patch solves it by releasing the relative skb, after processing\nthe above case in l2cap_recv_acldata().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Bluetooth: L2CAP: Fix memory leak in vhci_write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49908"
},
{
"category": "external",
"summary": "RHBZ#2363373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49908"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49908",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49908"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025050104-CVE-2022-49908-ad9a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025050104-CVE-2022-49908-ad9a@gregkh/T"
}
],
"release_date": "2025-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Bluetooth: L2CAP: Fix memory leak in vhci_write"
},
{
"cve": "CVE-2022-49925",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2363363"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Fix null-ptr-deref in ib_core_cleanup()\n\nKASAN reported a null-ptr-deref error:\n\n KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]\n CPU: 1 PID: 379\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n RIP: 0010:destroy_workqueue+0x2f/0x740\n RSP: 0018:ffff888016137df8 EFLAGS: 00000202\n ...\n Call Trace:\n ib_core_cleanup+0xa/0xa1 [ib_core]\n __do_sys_delete_module.constprop.0+0x34f/0x5b0\n do_syscall_64+0x3a/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n RIP: 0033:0x7fa1a0d221b7\n ...\n\nIt is because the fail of roce_gid_mgmt_init() is ignored:\n\n ib_core_init()\n roce_gid_mgmt_init()\n gid_cache_wq = alloc_ordered_workqueue # fail\n ...\n ib_core_cleanup()\n roce_gid_mgmt_cleanup()\n destroy_workqueue(gid_cache_wq)\n # destroy an unallocated wq\n\nFix this by catching the fail of roce_gid_mgmt_init() in ib_core_init().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Fix null-ptr-deref in ib_core_cleanup()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49925"
},
{
"category": "external",
"summary": "RHBZ#2363363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363363"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49925",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49925"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49925",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49925"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025050110-CVE-2022-49925-2485@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025050110-CVE-2022-49925-2485@gregkh/T"
}
],
"release_date": "2025-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/core: Fix null-ptr-deref in ib_core_cleanup()"
},
{
"cve": "CVE-2022-49934",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373399"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix UAF in ieee80211_scan_rx()\n\nieee80211_scan_rx() tries to access scan_req-\u003eflags after a\nnull check, but a UAF is observed when the scan is completed\nand __ieee80211_scan_completed() executes, which then calls\ncfg80211_scan_done() leading to the freeing of scan_req.\n\nSince scan_req is rcu_dereference()\u0027d, prevent the racing in\n__ieee80211_scan_completed() by ensuring that from mac80211\u0027s\nPOV it is no longer accessed from an RCU read critical section\nbefore we call cfg80211_scan_done().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Fix UAF in ieee80211_scan_rx()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49934"
},
{
"category": "external",
"summary": "RHBZ#2373399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49934"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-49934-108e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-49934-108e@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: Fix UAF in ieee80211_scan_rx()"
},
{
"cve": "CVE-2022-49935",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373404"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/dma-resv: check if the new fence is really later\n\nPreviously when we added a fence to a dma_resv object we always\nassumed the the newer than all the existing fences.\n\nWith Jason\u0027s work to add an UAPI to explicit export/import that\u0027s not\nnecessary the case any more. So without this check we would allow\nuserspace to force the kernel into an use after free error.\n\nSince the change is very small and defensive it\u0027s probably a good\nidea to backport this to stable kernels as well just in case others\nare using the dma_resv object in the same way.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dma-buf/dma-resv: check if the new fence is really later",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49935"
},
{
"category": "external",
"summary": "RHBZ#2373404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49935"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-49935-bf21@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-49935-bf21@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dma-buf/dma-resv: check if the new fence is really later"
},
{
"cve": "CVE-2022-49936",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373402"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Prevent nested device-reset calls\n\nAutomatic kernel fuzzing revealed a recursive locking violation in\nusb-storage:\n\n============================================\nWARNING: possible recursive locking detected\n5.18.0 #3 Not tainted\n--------------------------------------------\nkworker/1:3/1205 is trying to acquire lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\nbut task is already holding lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\n...\n\nstack backtrace:\nCPU: 1 PID: 1205 Comm: kworker/1:3 Not tainted 5.18.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_deadlock_bug kernel/locking/lockdep.c:2988 [inline]\ncheck_deadlock kernel/locking/lockdep.c:3031 [inline]\nvalidate_chain kernel/locking/lockdep.c:3816 [inline]\n__lock_acquire.cold+0x152/0x3ca kernel/locking/lockdep.c:5053\nlock_acquire kernel/locking/lockdep.c:5665 [inline]\nlock_acquire+0x1ab/0x520 kernel/locking/lockdep.c:5630\n__mutex_lock_common kernel/locking/mutex.c:603 [inline]\n__mutex_lock+0x14f/0x1610 kernel/locking/mutex.c:747\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\nusb_reset_device+0x37d/0x9a0 drivers/usb/core/hub.c:6109\nr871xu_dev_remove+0x21a/0x270 drivers/staging/rtl8712/usb_intf.c:622\nusb_unbind_interface+0x1bd/0x890 drivers/usb/core/driver.c:458\ndevice_remove drivers/base/dd.c:545 [inline]\ndevice_remove+0x11f/0x170 drivers/base/dd.c:537\n__device_release_driver drivers/base/dd.c:1222 [inline]\ndevice_release_driver_internal+0x1a7/0x2f0 drivers/base/dd.c:1248\nusb_driver_release_interface+0x102/0x180 drivers/usb/core/driver.c:627\nusb_forced_unbind_intf+0x4d/0xa0 drivers/usb/core/driver.c:1118\nusb_reset_device+0x39b/0x9a0 drivers/usb/core/hub.c:6114\n\nThis turned out not to be an error in usb-storage but rather a nested\ndevice reset attempt. That is, as the rtl8712 driver was being\nunbound from a composite device in preparation for an unrelated USB\nreset (that driver does not have pre_reset or post_reset callbacks),\nits -\u003eremove routine called usb_reset_device() -- thus nesting one\nreset call within another.\n\nPerforming a reset as part of disconnect processing is a questionable\npractice at best. However, the bug report points out that the USB\ncore does not have any protection against nested resets. Adding a\nreset_in_progress flag and testing it will prevent such errors in the\nfuture.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Prevent nested device-reset calls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49936"
},
{
"category": "external",
"summary": "RHBZ#2373402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49936"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-49936-f434@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-49936-f434@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: USB: core: Prevent nested device-reset calls"
},
{
"cve": "CVE-2022-49942",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373421"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Don\u0027t finalize CSA in IBSS mode if state is disconnected\n\nWhen we are not connected to a channel, sending channel \"switch\"\nannouncement doesn\u0027t make any sense.\n\nThe BSS list is empty in that case. This causes the for loop in\ncfg80211_get_bss() to be bypassed, so the function returns NULL\n(check line 1424 of net/wireless/scan.c), causing the WARN_ON()\nin ieee80211_ibss_csa_beacon() to get triggered (check line 500\nof net/mac80211/ibss.c), which was consequently reported on the\nsyzkaller dashboard.\n\nThus, check if we have an existing connection before generating\nthe CSA beacon in ieee80211_ibss_finish_csa().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Don\u0027t finalize CSA in IBSS mode if state is disconnected",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49942"
},
{
"category": "external",
"summary": "RHBZ#2373421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373421"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49942"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49942",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49942"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-49942-8f93@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-49942-8f93@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: Don\u0027t finalize CSA in IBSS mode if state is disconnected"
},
{
"cve": "CVE-2022-49951",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373687"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware_loader: Fix use-after-free during unregister\n\nIn the following code within firmware_upload_unregister(), the call to\ndevice_unregister() could result in the dev_release function freeing the\nfw_upload_priv structure before it is dereferenced for the call to\nmodule_put(). This bug was found by the kernel test robot using\nCONFIG_KASAN while running the firmware selftests.\n\n device_unregister(\u0026fw_sysfs-\u003edev);\n module_put(fw_upload_priv-\u003emodule);\n\nThe problem is fixed by copying fw_upload_priv-\u003emodule to a local variable\nfor use when calling device_unregister().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware_loader: Fix use-after-free during unregister",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49951"
},
{
"category": "external",
"summary": "RHBZ#2373687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49951"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061810-CVE-2022-49951-bc9b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061810-CVE-2022-49951-bc9b@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware_loader: Fix use-after-free during unregister"
},
{
"cve": "CVE-2022-49958",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373618"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fix netdevice reference leaks in attach_default_qdiscs()\n\nIn attach_default_qdiscs(), if a dev has multiple queues and queue 0 fails\nto attach qdisc because there is no memory in attach_one_default_qdisc().\nThen dev-\u003eqdisc will be noop_qdisc by default. But the other queues may be\nable to successfully attach to default qdisc.\n\nIn this case, the fallback to noqueue process will be triggered. If the\noriginal attached qdisc is not released and a new one is directly\nattached, this will cause netdevice reference leaks.\n\nThe following is the bug log:\n\nveth0: default qdisc (fq_codel) fail, fallback to noqueue\nunregister_netdevice: waiting for veth0 to become free. Usage count = 32\nleaked reference.\n qdisc_alloc+0x12e/0x210\n qdisc_create_dflt+0x62/0x140\n attach_one_default_qdisc.constprop.41+0x44/0x70\n dev_activate+0x128/0x290\n __dev_open+0x12a/0x190\n __dev_change_flags+0x1a2/0x1f0\n dev_change_flags+0x23/0x60\n do_setlink+0x332/0x1150\n __rtnl_newlink+0x52f/0x8e0\n rtnl_newlink+0x43/0x70\n rtnetlink_rcv_msg+0x140/0x3b0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x1bb/0x290\n netlink_sendmsg+0x37c/0x4e0\n sock_sendmsg+0x5f/0x70\n ____sys_sendmsg+0x208/0x280\n\nFix this bug by clearing any non-noop qdiscs that may have been assigned\nbefore trying to re-attach.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: fix netdevice reference leaks in attach_default_qdiscs()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49958"
},
{
"category": "external",
"summary": "RHBZ#2373618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49958"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061812-CVE-2022-49958-35f5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061812-CVE-2022-49958-35f5@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: fix netdevice reference leaks in attach_default_qdiscs()"
},
{
"cve": "CVE-2022-49959",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373521"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the openvswitch module in the Linux kernel. A missing release of allocated memory when an error occurs will cause a memory leak, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: openvswitch: fix memory leak at failed datapath creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.8 and 9.2 via RHSA-2023:2951 [1] and RHSA-2023:2458 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2023:2951\n\n[2]. https://access.redhat.com/errata/RHSA-2023:2458",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49959"
},
{
"category": "external",
"summary": "RHBZ#2373521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49959"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-49959-d2b7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-49959-d2b7@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: openvswitch: fix memory leak at failed datapath creation"
},
{
"cve": "CVE-2022-49960",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373614"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: fix null pointer dereference\n\nAsus chromebook CX550 crashes during boot on v5.17-rc1 kernel.\nThe root cause is null pointer defeference of bi_next\nin tgl_get_bw_info() in drivers/gpu/drm/i915/display/intel_bw.c.\n\nBUG: kernel NULL pointer dereference, address: 000000000000002e\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 1 Comm: swapper/0 Tainted: G U 5.17.0-rc1\nHardware name: Google Delbin/Delbin, BIOS Google_Delbin.13672.156.3 05/14/2021\nRIP: 0010:tgl_get_bw_info+0x2de/0x510\n...\n[ 2.554467] Call Trace:\n[ 2.554467] \u003cTASK\u003e\n[ 2.554467] intel_bw_init_hw+0x14a/0x434\n[ 2.554467] ? _printk+0x59/0x73\n[ 2.554467] ? _dev_err+0x77/0x91\n[ 2.554467] i915_driver_hw_probe+0x329/0x33e\n[ 2.554467] i915_driver_probe+0x4c8/0x638\n[ 2.554467] i915_pci_probe+0xf8/0x14e\n[ 2.554467] ? _raw_spin_unlock_irqrestore+0x12/0x2c\n[ 2.554467] pci_device_probe+0xaa/0x142\n[ 2.554467] really_probe+0x13f/0x2f4\n[ 2.554467] __driver_probe_device+0x9e/0xd3\n[ 2.554467] driver_probe_device+0x24/0x7c\n[ 2.554467] __driver_attach+0xba/0xcf\n[ 2.554467] ? driver_attach+0x1f/0x1f\n[ 2.554467] bus_for_each_dev+0x8c/0xc0\n[ 2.554467] bus_add_driver+0x11b/0x1f7\n[ 2.554467] driver_register+0x60/0xea\n[ 2.554467] ? mipi_dsi_bus_init+0x16/0x16\n[ 2.554467] i915_init+0x2c/0xb9\n[ 2.554467] ? mipi_dsi_bus_init+0x16/0x16\n[ 2.554467] do_one_initcall+0x12e/0x2b3\n[ 2.554467] do_initcall_level+0xd6/0xf3\n[ 2.554467] do_initcalls+0x4e/0x79\n[ 2.554467] kernel_init_freeable+0xed/0x14d\n[ 2.554467] ? rest_init+0xc1/0xc1\n[ 2.554467] kernel_init+0x1a/0x120\n[ 2.554467] ret_from_fork+0x1f/0x30\n[ 2.554467] \u003c/TASK\u003e\n...\nKernel panic - not syncing: Fatal exception\n\n(cherry picked from commit c247cd03898c4c43c3bce6d4014730403bc13032)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/i915: fix null pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49960"
},
{
"category": "external",
"summary": "RHBZ#2373614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373614"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49960"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-49960-d554@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-49960-d554@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/i915: fix null pointer dereference"
},
{
"cve": "CVE-2022-49962",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373582"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix null pointer dereference in remove if xHC has only one roothub\n\nThe remove path in xhci platform driver tries to remove and put both main\nand shared hcds even if only a main hcd exists (one roothub)\n\nThis causes a null pointer dereference in reboot for those controllers.\n\nCheck that the shared_hcd exists before trying to remove it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xhci: Fix null pointer dereference in remove if xHC has only one roothub",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49962"
},
{
"category": "external",
"summary": "RHBZ#2373582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373582"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49962"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49962",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49962"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-49962-aced@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-49962-aced@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xhci: Fix null pointer dereference in remove if xHC has only one roothub"
},
{
"cve": "CVE-2022-49964",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373491"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level\n\nThough acpi_find_last_cache_level() always returned signed value and the\ndocument states it will return any errors caused by lack of a PPTT table,\nit never returned negative values before.\n\nCommit 0c80f9e165f8 (\"ACPI: PPTT: Leave the table mapped for the runtime usage\")\nhowever changed it by returning -ENOENT if no PPTT was found. The value\nreturned from acpi_find_last_cache_level() is then assigned to unsigned\nfw_level.\n\nIt will result in the number of cache leaves calculated incorrectly as\na huge value which will then cause the following warning from __alloc_pages\nas the order would be great than MAX_ORDER because of incorrect and huge\ncache leaves value.\n\n | WARNING: CPU: 0 PID: 1 at mm/page_alloc.c:5407 __alloc_pages+0x74/0x314\n | Modules linked in:\n | CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-10393-g7c2a8d3ac4c0 #73\n | pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n | pc : __alloc_pages+0x74/0x314\n | lr : alloc_pages+0xe8/0x318\n | Call trace:\n | __alloc_pages+0x74/0x314\n | alloc_pages+0xe8/0x318\n | kmalloc_order_trace+0x68/0x1dc\n | __kmalloc+0x240/0x338\n | detect_cache_attributes+0xe0/0x56c\n | update_siblings_masks+0x38/0x284\n | store_cpu_topology+0x78/0x84\n | smp_prepare_cpus+0x48/0x134\n | kernel_init_freeable+0xc4/0x14c\n | kernel_init+0x2c/0x1b4\n | ret_from_fork+0x10/0x20\n\nFix the same by changing fw_level to be signed integer and return the\nerror from init_cache_level() early in case of error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: arm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49964"
},
{
"category": "external",
"summary": "RHBZ#2373491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373491"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49964"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49964-ff03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49964-ff03@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: arm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level"
},
{
"cve": "CVE-2022-49965",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373583"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: add missing -\u003efini_xxxx interfaces for some SMU13 asics\n\nWithout these, potential memory leak may be induced.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amd/pm: add missing -\u003efini_xxxx interfaces for some SMU13 asics",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49965"
},
{
"category": "external",
"summary": "RHBZ#2373583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49965"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49965-08f3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49965-08f3@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amd/pm: add missing -\u003efini_xxxx interfaces for some SMU13 asics"
},
{
"cve": "CVE-2022-49966",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373592"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid\n\nTo avoid any potential memory leak.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49966"
},
{
"category": "external",
"summary": "RHBZ#2373592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49966"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49966-6b06@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49966-6b06@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid"
},
{
"cve": "CVE-2022-49969",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373635"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: clear optc underflow before turn off odm clock\n\n[Why]\nAfter ODM clock off, optc underflow bit will be kept there always and clear not work.\nWe need to clear that before clock off.\n\n[How]\nClear that if have when clock off.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amd/display: clear optc underflow before turn off odm clock",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49969"
},
{
"category": "external",
"summary": "RHBZ#2373635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49969"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49969",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49969"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-49969-fd54@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-49969-fd54@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amd/display: clear optc underflow before turn off odm clock"
},
{
"cve": "CVE-2022-49971",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373584"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Fix a potential gpu_metrics_table memory leak\n\nMemory is allocated for gpu_metrics_table in\nsmu_v13_0_4_init_smc_tables(), but not freed in\nsmu_v13_0_4_fini_smc_tables(). This may cause memory leaks, fix it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amd/pm: Fix a potential gpu_metrics_table memory leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49971"
},
{
"category": "external",
"summary": "RHBZ#2373584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49971"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-49971-7e9c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-49971-7e9c@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amd/pm: Fix a potential gpu_metrics_table memory leak"
},
{
"cve": "CVE-2022-49983",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373495"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudmabuf: Set the DMA mask for the udmabuf device (v2)\n\nIf the DMA mask is not set explicitly, the following warning occurs\nwhen the userspace tries to access the dma-buf via the CPU as\nreported by syzbot here:\n\nWARNING: CPU: 1 PID: 3595 at kernel/dma/mapping.c:188\n__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nModules linked in:\nCPU: 0 PID: 3595 Comm: syz-executor249 Not tainted\n5.17.0-rc2-syzkaller-00316-g0457e5153e0e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS\nGoogle 01/01/2011\nRIP: 0010:__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nCode: 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 71 4c 8b 3d c0\n83 b5 0d e9 db fe ff ff e8 b6 0f 13 00 0f 0b e8 af 0f 13 00 \u003c0f\u003e 0b 45\n 31 e4 e9 54 ff ff ff e8 a0 0f 13 00 49 8d 7f 50 48 b8 00\nRSP: 0018:ffffc90002a07d68 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff88807e25e2c0 RSI: ffffffff81649e91 RDI: ffff88801b848408\nRBP: ffff88801b848000 R08: 0000000000000002 R09: ffff88801d86c74f\nR10: ffffffff81649d72 R11: 0000000000000001 R12: 0000000000000002\nR13: ffff88801d86c680 R14: 0000000000000001 R15: 0000000000000000\nFS: 0000555556e30300(0000) GS:ffff8880b9d00000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200000cc CR3: 000000001d74a000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dma_map_sgtable+0x70/0xf0 kernel/dma/mapping.c:264\n get_sg_table.isra.0+0xe0/0x160 drivers/dma-buf/udmabuf.c:72\n begin_cpu_udmabuf+0x130/0x1d0 drivers/dma-buf/udmabuf.c:126\n dma_buf_begin_cpu_access+0xfd/0x1d0 drivers/dma-buf/dma-buf.c:1164\n dma_buf_ioctl+0x259/0x2b0 drivers/dma-buf/dma-buf.c:363\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f62fcf530f9\nCode: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89\nf7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01\nf0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffe3edab9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f62fcf530f9\nRDX: 0000000020000200 RSI: 0000000040086200 RDI: 0000000000000006\nRBP: 00007f62fcf170e0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f62fcf17170\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n\nv2: Dont\u0027t forget to deregister if DMA mask setup fails.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udmabuf: Set the DMA mask for the udmabuf device (v2)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49983"
},
{
"category": "external",
"summary": "RHBZ#2373495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49983"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-49983-dd32@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-49983-dd32@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: udmabuf: Set the DMA mask for the udmabuf device (v2)"
},
{
"cve": "CVE-2022-49986",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373671"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq\n\nstorvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it\ndoesn\u0027t need to make forward progress under memory pressure. Marking this\nworkqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a\nnon-WQ_MEM_RECLAIM workqueue. In the current state it causes the following\nwarning:\n\n[ 14.506347] ------------[ cut here ]------------\n[ 14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn\n[ 14.506360] WARNING: CPU: 0 PID: 8 at \u003c-snip-\u003ekernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130\n[ 14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu\n[ 14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[ 14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun\n[ 14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130\n\t\t\u003c-snip-\u003e\n[ 14.506408] Call Trace:\n[ 14.506412] __flush_work+0xf1/0x1c0\n[ 14.506414] __cancel_work_timer+0x12f/0x1b0\n[ 14.506417] ? kernfs_put+0xf0/0x190\n[ 14.506418] cancel_delayed_work_sync+0x13/0x20\n[ 14.506420] disk_block_events+0x78/0x80\n[ 14.506421] del_gendisk+0x3d/0x2f0\n[ 14.506423] sr_remove+0x28/0x70\n[ 14.506427] device_release_driver_internal+0xef/0x1c0\n[ 14.506428] device_release_driver+0x12/0x20\n[ 14.506429] bus_remove_device+0xe1/0x150\n[ 14.506431] device_del+0x167/0x380\n[ 14.506432] __scsi_remove_device+0x11d/0x150\n[ 14.506433] scsi_remove_device+0x26/0x40\n[ 14.506434] storvsc_remove_lun+0x40/0x60\n[ 14.506436] process_one_work+0x209/0x400\n[ 14.506437] worker_thread+0x34/0x400\n[ 14.506439] kthread+0x121/0x140\n[ 14.506440] ? process_one_work+0x400/0x400\n[ 14.506441] ? kthread_park+0x90/0x90\n[ 14.506443] ret_from_fork+0x35/0x40\n[ 14.506445] ---[ end trace 2d9633159fdc6ee7 ]---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49986"
},
{
"category": "external",
"summary": "RHBZ#2373671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373671"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49986"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49986",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49986"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061823-CVE-2022-49986-d434@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061823-CVE-2022-49986-d434@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq"
},
{
"cve": "CVE-2022-50000",
"cwe": {
"id": "CWE-820",
"name": "Missing Synchronization"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373543"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: fix stuck flows on cleanup due to pending work\n\nTo clear the flow table on flow table free, the following sequence\nnormally happens in order:\n\n 1) gc_step work is stopped to disable any further stats/del requests.\n 2) All flow table entries are set to teardown state.\n 3) Run gc_step which will queue HW del work for each flow table entry.\n 4) Waiting for the above del work to finish (flush).\n 5) Run gc_step again, deleting all entries from the flow table.\n 6) Flow table is freed.\n\nBut if a flow table entry already has pending HW stats or HW add work\nstep 3 will not queue HW del work (it will be skipped), step 4 will wait\nfor the pending add/stats to finish, and step 5 will queue HW del work\nwhich might execute after freeing of the flow table.\n\nTo fix the above, this patch flushes the pending work, then it sets the\nteardown flag to all flows in the flowtable and it forces a garbage\ncollector run to queue work to remove the flows from hardware, then it\nflushes this new pending work and (finally) it forces another garbage\ncollector run to remove the entry from the software flowtable.\n\nStack trace:\n[47773.882335] BUG: KASAN: use-after-free in down_read+0x99/0x460\n[47773.883634] Write of size 8 at addr ffff888103b45aa8 by task kworker/u20:6/543704\n[47773.885634] CPU: 3 PID: 543704 Comm: kworker/u20:6 Not tainted 5.12.0-rc7+ #2\n[47773.886745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)\n[47773.888438] Workqueue: nf_ft_offload_del flow_offload_work_handler [nf_flow_table]\n[47773.889727] Call Trace:\n[47773.890214] dump_stack+0xbb/0x107\n[47773.890818] print_address_description.constprop.0+0x18/0x140\n[47773.892990] kasan_report.cold+0x7c/0xd8\n[47773.894459] kasan_check_range+0x145/0x1a0\n[47773.895174] down_read+0x99/0x460\n[47773.899706] nf_flow_offload_tuple+0x24f/0x3c0 [nf_flow_table]\n[47773.907137] flow_offload_work_handler+0x72d/0xbe0 [nf_flow_table]\n[47773.913372] process_one_work+0x8ac/0x14e0\n[47773.921325]\n[47773.921325] Allocated by task 592159:\n[47773.922031] kasan_save_stack+0x1b/0x40\n[47773.922730] __kasan_kmalloc+0x7a/0x90\n[47773.923411] tcf_ct_flow_table_get+0x3cb/0x1230 [act_ct]\n[47773.924363] tcf_ct_init+0x71c/0x1156 [act_ct]\n[47773.925207] tcf_action_init_1+0x45b/0x700\n[47773.925987] tcf_action_init+0x453/0x6b0\n[47773.926692] tcf_exts_validate+0x3d0/0x600\n[47773.927419] fl_change+0x757/0x4a51 [cls_flower]\n[47773.928227] tc_new_tfilter+0x89a/0x2070\n[47773.936652]\n[47773.936652] Freed by task 543704:\n[47773.937303] kasan_save_stack+0x1b/0x40\n[47773.938039] kasan_set_track+0x1c/0x30\n[47773.938731] kasan_set_free_info+0x20/0x30\n[47773.939467] __kasan_slab_free+0xe7/0x120\n[47773.940194] slab_free_freelist_hook+0x86/0x190\n[47773.941038] kfree+0xce/0x3a0\n[47773.941644] tcf_ct_flow_table_cleanup_work\n\nOriginal patch description and stack trace by Paul Blakey.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: flowtable: fix stuck flows on cleanup due to pending work",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50000"
},
{
"category": "external",
"summary": "RHBZ#2373543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50000"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50000-5753@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50000-5753@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: flowtable: fix stuck flows on cleanup due to pending work"
},
{
"cve": "CVE-2022-50001",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373652"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_tproxy: restrict to prerouting hook\n\nTPROXY is only allowed from prerouting, but nft_tproxy doesn\u0027t check this.\nThis fixes a crash (null dereference) when using tproxy from e.g. output.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nft_tproxy: restrict to prerouting hook",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50001"
},
{
"category": "external",
"summary": "RHBZ#2373652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50001"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50001-51f3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50001-51f3@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nft_tproxy: restrict to prerouting hook"
},
{
"cve": "CVE-2022-50002",
"cwe": {
"id": "CWE-821",
"name": "Incorrect Synchronization"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373471"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READY\n\nOnly set MLX5_LAG_FLAG_NDEVS_READY if both netdevices are registered.\nDoing so guarantees that both ldev-\u003epf[MLX5_LAG_P0].dev and\nldev-\u003epf[MLX5_LAG_P1].dev have valid pointers when\nMLX5_LAG_FLAG_NDEVS_READY is set.\n\nThe core issue is asymmetry in setting MLX5_LAG_FLAG_NDEVS_READY and\nclearing it. Setting it is done wrongly when both\nldev-\u003epf[MLX5_LAG_P0].dev and ldev-\u003epf[MLX5_LAG_P1].dev are set;\nclearing it is done right when either of ldev-\u003epf[i].netdev is cleared.\n\nConsider the following scenario:\n1. PF0 loads and sets ldev-\u003epf[MLX5_LAG_P0].dev to a valid pointer\n2. PF1 loads and sets both ldev-\u003epf[MLX5_LAG_P1].dev and\n ldev-\u003epf[MLX5_LAG_P1].netdev with valid pointers. This results in\n MLX5_LAG_FLAG_NDEVS_READY is set.\n3. PF0 is unloaded before setting dev-\u003epf[MLX5_LAG_P0].netdev.\n MLX5_LAG_FLAG_NDEVS_READY remains set.\n\nFurther execution of mlx5_do_bond() will result in null pointer\ndereference when calling mlx5_lag_is_multipath()\n\nThis patch fixes the following call trace actually encountered:\n\n[ 1293.475195] BUG: kernel NULL pointer dereference, address: 00000000000009a8\n[ 1293.478756] #PF: supervisor read access in kernel mode\n[ 1293.481320] #PF: error_code(0x0000) - not-present page\n[ 1293.483686] PGD 0 P4D 0\n[ 1293.484434] Oops: 0000 [#1] SMP PTI\n[ 1293.485377] CPU: 1 PID: 23690 Comm: kworker/u16:2 Not tainted 5.18.0-rc5_for_upstream_min_debug_2022_05_05_10_13 #1\n[ 1293.488039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 1293.490836] Workqueue: mlx5_lag mlx5_do_bond_work [mlx5_core]\n[ 1293.492448] RIP: 0010:mlx5_lag_is_multipath+0x5/0x50 [mlx5_core]\n[ 1293.494044] Code: e8 70 40 ff e0 48 8b 14 24 48 83 05 5c 1a 1b 00 01 e9 19 ff ff ff 48 83 05 47 1a 1b 00 01 eb d7 0f 1f 44 00 00 0f 1f 44 00 00 \u003c48\u003e 8b 87 a8 09 00 00 48 85 c0 74 26 48 83 05 a7 1b 1b 00 01 41 b8\n[ 1293.498673] RSP: 0018:ffff88811b2fbe40 EFLAGS: 00010202\n[ 1293.500152] RAX: ffff88818a94e1c0 RBX: ffff888165eca6c0 RCX: 0000000000000000\n[ 1293.501841] RDX: 0000000000000001 RSI: ffff88818a94e1c0 RDI: 0000000000000000\n[ 1293.503585] RBP: 0000000000000000 R08: ffff888119886740 R09: ffff888165eca73c\n[ 1293.505286] R10: 0000000000000018 R11: 0000000000000018 R12: ffff88818a94e1c0\n[ 1293.506979] R13: ffff888112729800 R14: 0000000000000000 R15: ffff888112729858\n[ 1293.508753] FS: 0000000000000000(0000) GS:ffff88852cc40000(0000) knlGS:0000000000000000\n[ 1293.510782] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1293.512265] CR2: 00000000000009a8 CR3: 00000001032d4002 CR4: 0000000000370ea0\n[ 1293.514001] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1293.515806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READY",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50002"
},
{
"category": "external",
"summary": "RHBZ#2373471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373471"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50002"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50002-9e5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50002-9e5f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READY"
},
{
"cve": "CVE-2022-50007",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373594"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the XFRM subsystem in the Linux kernel. A missing decrement of the reference count when an error occurs will cause a memory leak, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfrm: fix refcount leak in __xfrm_policy_check()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.8 and 9.2 via RHSA-2023:2951 [1] and RHSA-2023:2458 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2023:2951\n\n[2]. https://access.redhat.com/errata/RHSA-2023:2458",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50007"
},
{
"category": "external",
"summary": "RHBZ#2373594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373594"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50007"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061830-CVE-2022-50007-95d2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061830-CVE-2022-50007-95d2@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: xfrm: fix refcount leak in __xfrm_policy_check()"
},
{
"cve": "CVE-2022-50015",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373591"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot\n\nIt is not yet clear, but it is possible to create a firmware so broken\nthat it will send a reply message before a FW_READY message (it is not\nyet clear if FW_READY will arrive later).\nSince the reply_data is allocated only after the FW_READY message, this\nwill lead to a NULL pointer dereference if not filtered out.\n\nThe issue was reported with IPC4 firmware but the same condition is present\nfor IPC3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50015"
},
{
"category": "external",
"summary": "RHBZ#2373591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373591"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50015",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50015"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50015-4f7f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50015-4f7f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot"
},
{
"cve": "CVE-2022-50016",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373563"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot\n\nIt is not yet clear, but it is possible to create a firmware so broken\nthat it will send a reply message before a FW_READY message (it is not\nyet clear if FW_READY will arrive later).\nSince the reply_data is allocated only after the FW_READY message, this\nwill lead to a NULL pointer dereference if not filtered out.\n\nThe issue was reported with IPC4 firmware but the same condition is present\nfor IPC3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50016"
},
{
"category": "external",
"summary": "RHBZ#2373563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50016",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50016"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50016-ec03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50016-ec03@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot"
},
{
"cve": "CVE-2022-50022",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373672"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers:md:fix a potential use-after-free bug\n\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh-\u003ebatch_head \u0026\u0026 sh != sh-\u003ebatch_head)\". This may result in an\nuse-after-free bug.\n\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers:md:fix a potential use-after-free bug",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50022"
},
{
"category": "external",
"summary": "RHBZ#2373672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373672"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50022"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50022-98b6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50022-98b6@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drivers:md:fix a potential use-after-free bug"
},
{
"cve": "CVE-2022-50035",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373595"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex\n\nIf amdgpu_cs_vm_handling returns r != 0, then it will unlock the\nbo_list_mutex inside the function amdgpu_cs_vm_handling and again on\namdgpu_cs_parser_fini. This problem results in the following\nuse-after-free problem:\n\n[ 220.280990] ------------[ cut here ]------------\n[ 220.281000] refcount_t: underflow; use-after-free.\n[ 220.281019] WARNING: CPU: 1 PID: 3746 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n[ 220.281029] ------------[ cut here ]------------\n[ 220.281415] CPU: 1 PID: 3746 Comm: chrome:cs0 Tainted: G W L ------- --- 5.20.0-0.rc0.20220812git7ebfc85e2cd7.10.fc38.x86_64 #1\n[ 220.281421] Hardware name: System manufacturer System Product Name/ROG STRIX X570-I GAMING, BIOS 4403 04/27/2022\n[ 220.281426] RIP: 0010:refcount_warn_saturate+0xba/0x110\n[ 220.281431] Code: 01 01 e8 79 4a 6f 00 0f 0b e9 42 47 a5 00 80 3d de\n7e be 01 00 75 85 48 c7 c7 f8 98 8e 98 c6 05 ce 7e be 01 01 e8 56 4a\n6f 00 \u003c0f\u003e 0b e9 1f 47 a5 00 80 3d b9 7e be 01 00 0f 85 5e ff ff ff 48\nc7\n[ 220.281437] RSP: 0018:ffffb4b0d18d7a80 EFLAGS: 00010282\n[ 220.281443] RAX: 0000000000000026 RBX: 0000000000000003 RCX: 0000000000000000\n[ 220.281448] RDX: 0000000000000001 RSI: ffffffff988d06dc RDI: 00000000ffffffff\n[ 220.281452] RBP: 00000000ffffffff R08: 0000000000000000 R09: ffffb4b0d18d7930\n[ 220.281457] R10: 0000000000000003 R11: ffffa0672e2fffe8 R12: ffffa058ca360400\n[ 220.281461] R13: ffffa05846c50a18 R14: 00000000fffffe00 R15: 0000000000000003\n[ 220.281465] FS: 00007f82683e06c0(0000) GS:ffffa066e2e00000(0000) knlGS:0000000000000000\n[ 220.281470] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 220.281475] CR2: 00003590005cc000 CR3: 00000001fca46000 CR4: 0000000000350ee0\n[ 220.281480] Call Trace:\n[ 220.281485] \u003cTASK\u003e\n[ 220.281490] amdgpu_cs_ioctl+0x4e2/0x2070 [amdgpu]\n[ 220.281806] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]\n[ 220.282028] drm_ioctl_kernel+0xa4/0x150\n[ 220.282043] drm_ioctl+0x21f/0x420\n[ 220.282053] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]\n[ 220.282275] ? lock_release+0x14f/0x460\n[ 220.282282] ? _raw_spin_unlock_irqrestore+0x30/0x60\n[ 220.282290] ? _raw_spin_unlock_irqrestore+0x30/0x60\n[ 220.282297] ? lockdep_hardirqs_on+0x7d/0x100\n[ 220.282305] ? _raw_spin_unlock_irqrestore+0x40/0x60\n[ 220.282317] amdgpu_drm_ioctl+0x4a/0x80 [amdgpu]\n[ 220.282534] __x64_sys_ioctl+0x90/0xd0\n[ 220.282545] do_syscall_64+0x5b/0x80\n[ 220.282551] ? futex_wake+0x6c/0x150\n[ 220.282568] ? lock_is_held_type+0xe8/0x140\n[ 220.282580] ? do_syscall_64+0x67/0x80\n[ 220.282585] ? lockdep_hardirqs_on+0x7d/0x100\n[ 220.282592] ? do_syscall_64+0x67/0x80\n[ 220.282597] ? do_syscall_64+0x67/0x80\n[ 220.282602] ? lockdep_hardirqs_on+0x7d/0x100\n[ 220.282609] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 220.282616] RIP: 0033:0x7f8282a4f8bf\n[ 220.282639] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10\n00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00\n0f 05 \u003c89\u003e c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00\n00\n[ 220.282644] RSP: 002b:00007f82683df410 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 220.282651] RAX: ffffffffffffffda RBX: 00007f82683df588 RCX: 00007f8282a4f8bf\n[ 220.282655] RDX: 00007f82683df4d0 RSI: 00000000c0186444 RDI: 0000000000000018\n[ 220.282659] RBP: 00007f82683df4d0 R08: 00007f82683df5e0 R09: 00007f82683df4b0\n[ 220.282663] R10: 00001d04000a0600 R11: 0000000000000246 R12: 00000000c0186444\n[ 220.282667] R13: 0000000000000018 R14: 00007f82683df588 R15: 0000000000000003\n[ 220.282689] \u003c/TASK\u003e\n[ 220.282693] irq event stamp: 6232311\n[ 220.282697] hardirqs last enabled at (6232319): [\u003cffffffff9718cd7e\u003e] __up_console_sem+0x5e/0x70\n[ 220.282704] hardirqs last disabled at (6232326): [\u003cffffffff9718cd63\u003e] __up_console_sem+0x43/0x70\n[ 220.282709] softirqs last enabled at (6232072): [\u003cffffffff970ff669\u003e] __irq_exit_rcu+0xf9/0x170\n[ 220.282716] softirqs last disabled at (6232061): [\u003cffffffff97\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50035"
},
{
"category": "external",
"summary": "RHBZ#2373595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50035"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2022-50035-ae6f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2022-50035-ae6f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex"
},
{
"cve": "CVE-2022-50037",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373420"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/ttm: don\u0027t leak the ccs state\n\nThe kernel only manages the ccs state with lmem-only objects, however\nthe kernel should still take care not to leak the CCS state from the\nprevious user.\n\n(cherry picked from commit 353819d85f87be46aeb9c1dd929d445a006fc6ec)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/i915/ttm: don\u0027t leak the ccs state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50037"
},
{
"category": "external",
"summary": "RHBZ#2373420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373420"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50037"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061841-CVE-2022-50037-ca44@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061841-CVE-2022-50037-ca44@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/i915/ttm: don\u0027t leak the ccs state"
},
{
"cve": "CVE-2022-50039",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373422"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()\n\nCommit 09f012e64e4b (\"stmmac: intel: Fix clock handling on error and remove\npaths\") removed this clk_disable_unprepare()\n\nThis was partly revert by commit ac322f86b56c (\"net: stmmac: Fix clock\nhandling on remove path\") which removed this clk_disable_unprepare()\nbecause:\n\"\n While unloading the dwmac-intel driver, clk_disable_unprepare() is\n being called twice in stmmac_dvr_remove() and\n intel_eth_pci_remove(). This causes kernel panic on the second call.\n\"\n\nHowever later on, commit 5ec55823438e8 (\"net: stmmac: add clocks management\nfor gmac driver\") has updated stmmac_dvr_remove() which do not call\nclk_disable_unprepare() anymore.\n\nSo this call should now be called from intel_eth_pci_remove().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50039"
},
{
"category": "external",
"summary": "RHBZ#2373422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50039"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2022-50039-7dd9@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2022-50039-7dd9@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()"
},
{
"cve": "CVE-2022-50041",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373609"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix call trace with null VSI during VF reset\n\nDuring stress test with attaching and detaching VF from KVM and\nsimultaneously changing VFs spoofcheck and trust there was a\ncall trace in ice_reset_vf that VF\u0027s VSI is null.\n\n[145237.352797] WARNING: CPU: 46 PID: 840629 at drivers/net/ethernet/intel/ice/ice_vf_lib.c:508 ice_reset_vf+0x3d6/0x410 [ice]\n[145237.352851] Modules linked in: ice(E) vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type1 vfio iavf dm_mod xt_CHECKSUM xt_MASQUERADE\nxt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink tun\n bridge stp llc sunrpc intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm iTCO_wdt iTC\nO_vendor_support irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl ipmi_si intel_cstate ipmi_devintf joydev intel_uncore m\nei_me ipmi_msghandler i2c_i801 pcspkr mei lpc_ich ioatdma i2c_smbus acpi_pad acpi_power_meter ip_tables xfs libcrc32c i2c_algo_bit drm_sh\nmem_helper drm_kms_helper sd_mod t10_pi crc64_rocksoft syscopyarea crc64 sysfillrect sg sysimgblt fb_sys_fops drm i40e ixgbe ahci libahci\n libata crc32c_intel mdio dca wmi fuse [last unloaded: ice]\n[145237.352917] CPU: 46 PID: 840629 Comm: kworker/46:2 Tainted: G S W I E 5.19.0-rc6+ #24\n[145237.352921] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS SE5C610.86B.01.01.0008.021120151325 02/11/2015\n[145237.352923] Workqueue: ice ice_service_task [ice]\n[145237.352948] RIP: 0010:ice_reset_vf+0x3d6/0x410 [ice]\n[145237.352984] Code: 30 ec f3 cc e9 28 fd ff ff 0f b7 4b 50 48 c7 c2 48 19 9c c0 4c 89 ee 48 c7 c7 30 fe 9e c0 e8 d1 21 9d cc 31 c0 e9 a\n9 fe ff ff \u003c0f\u003e 0b b8 ea ff ff ff e9 c1 fc ff ff 0f 0b b8 fb ff ff ff e9 91 fe\n[145237.352987] RSP: 0018:ffffb453e257fdb8 EFLAGS: 00010246\n[145237.352990] RAX: ffff8bd0040181c0 RBX: ffff8be68db8f800 RCX: 0000000000000000\n[145237.352991] RDX: 000000000000ffff RSI: 0000000000000000 RDI: ffff8be68db8f800\n[145237.352993] RBP: ffff8bd0040181c0 R08: 0000000000001000 R09: ffff8bcfd520e000\n[145237.352995] R10: 0000000000000000 R11: 00008417b5ab0bc0 R12: 0000000000000005\n[145237.352996] R13: ffff8bcee061c0d0 R14: ffff8bd004019640 R15: 0000000000000000\n[145237.352998] FS: 0000000000000000(0000) GS:ffff8be5dfb00000(0000) knlGS:0000000000000000\n[145237.353000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[145237.353002] CR2: 00007fd81f651d68 CR3: 0000001a0fe10001 CR4: 00000000001726e0\n[145237.353003] Call Trace:\n[145237.353008] \u003cTASK\u003e\n[145237.353011] ice_process_vflr_event+0x8d/0xb0 [ice]\n[145237.353049] ice_service_task+0x79f/0xef0 [ice]\n[145237.353074] process_one_work+0x1c8/0x390\n[145237.353081] ? process_one_work+0x390/0x390\n[145237.353084] worker_thread+0x30/0x360\n[145237.353087] ? process_one_work+0x390/0x390\n[145237.353090] kthread+0xe8/0x110\n[145237.353094] ? kthread_complete_and_exit+0x20/0x20\n[145237.353097] ret_from_fork+0x22/0x30\n[145237.353103] \u003c/TASK\u003e\n\nRemove WARN_ON() from check if VSI is null in ice_reset_vf.\nAdd \"VF is already removed\\n\" in dev_dbg().\n\nThis WARN_ON() is unnecessary and causes call trace, despite that\ncall trace, driver still works. There is no need for this warn\nbecause this piece of code is responsible for disabling VF\u0027s Tx/Rx\nqueues when VF is disabled, but when VF is already removed there\nis no need to do reset or disable queues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ice: Fix call trace with null VSI during VF reset",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50041"
},
{
"category": "external",
"summary": "RHBZ#2373609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373609"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50041"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50041",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50041"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2022-50041-0e33@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2022-50041-0e33@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ice: Fix call trace with null VSI during VF reset"
},
{
"cve": "CVE-2022-50044",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373627"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qrtr: start MHI channel after endpoit creation\n\nMHI channel may generates event/interrupt right after enabling.\nIt may leads to 2 race conditions issues.\n\n1)\nSuch event may be dropped by qcom_mhi_qrtr_dl_callback() at check:\n\n\tif (!qdev || mhi_res-\u003etransaction_status)\n\t\treturn;\n\nBecause dev_set_drvdata(\u0026mhi_dev-\u003edev, qdev) may be not performed at\nthis moment. In this situation qrtr-ns will be unable to enumerate\nservices in device.\n---------------------------------------------------------------\n\n2)\nSuch event may come at the moment after dev_set_drvdata() and\nbefore qrtr_endpoint_register(). In this case kernel will panic with\naccessing wrong pointer at qcom_mhi_qrtr_dl_callback():\n\n\trc = qrtr_endpoint_post(\u0026qdev-\u003eep, mhi_res-\u003ebuf_addr,\n\t\t\t\tmhi_res-\u003ebytes_xferd);\n\nBecause endpoint is not created yet.\n--------------------------------------------------------------\nSo move mhi_prepare_for_transfer_autoqueue after endpoint creation\nto fix it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: qrtr: start MHI channel after endpoit creation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50044"
},
{
"category": "external",
"summary": "RHBZ#2373627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50044"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50044",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50044"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50044-0b6b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50044-0b6b@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: qrtr: start MHI channel after endpoit creation"
},
{
"cve": "CVE-2022-50048",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373580"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: possible module reference underflow in error path\n\ndst-\u003eops is set on when nft_expr_clone() fails, but module refcount has\nnot been bumped yet, therefore nft_expr_destroy() leads to module\nreference underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: possible module reference underflow in error path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50048"
},
{
"category": "external",
"summary": "RHBZ#2373580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50048"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50048",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50048"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50048-40d7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50048-40d7@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: netfilter: nf_tables: possible module reference underflow in error path"
},
{
"cve": "CVE-2022-50049",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373440"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: DPCM: Don\u0027t pick up BE without substream\n\nWhen DPCM tries to add valid BE connections at dpcm_add_paths(), it\ndoesn\u0027t check whether the picked BE actually supports for the given\nstream direction. Due to that, when an asymmetric BE stream is\npresent, it picks up wrongly and this may result in a NULL dereference\nat a later point where the code assumes the existence of a\ncorresponding BE substream.\n\nThis patch adds the check for the presence of the substream for the\ntarget BE for avoiding the problem above.\n\nNote that we have already some fix for non-existing BE substream at\ncommit 6246f283d5e0 (\"ASoC: dpcm: skip missing substream while\napplying symmetry\"). But the code path we\u0027ve hit recently is rather\nhappening before the previous fix. So this patch tries to fix at\npicking up a BE instead of parsing BE lists.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ASoC: DPCM: Don\u0027t pick up BE without substream",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50049"
},
{
"category": "external",
"summary": "RHBZ#2373440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50049"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50049-f6d9@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50049-f6d9@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ASoC: DPCM: Don\u0027t pick up BE without substream"
},
{
"cve": "CVE-2022-50050",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373423"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in the buffer\noverflow (although it\u0027s unrealistic).\n\nThis patch replaces with a safer version, scnprintf() for papering\nover such a potential issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50050"
},
{
"category": "external",
"summary": "RHBZ#2373423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50050",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50050"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50050",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50050"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50050-f90d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50050-f90d@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()"
},
{
"cve": "CVE-2022-50068",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373573"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the ttm module in the Linux kernel. A NULL pointer dereference can be triggered due to an improper check, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/ttm: Fix dummy res NULL ptr deref bug",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.8 and 9.2 via RHSA-2023:2951 [1] and RHSA-2023:2458 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2023:2951\n\n[2]. https://access.redhat.com/errata/RHSA-2023:2458",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50068"
},
{
"category": "external",
"summary": "RHBZ#2373573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50068"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50068",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50068"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061852-CVE-2022-50068-25c3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061852-CVE-2022-50068-25c3@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/ttm: Fix dummy res NULL ptr deref bug"
},
{
"cve": "CVE-2022-50070",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373435"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: do not queue data on closed subflows\n\nDipanjan reported a syzbot splat at close time:\n\nWARNING: CPU: 1 PID: 10818 at net/ipv4/af_inet.c:153\ninet_sock_destruct+0x6d0/0x8e0 net/ipv4/af_inet.c:153\nModules linked in: uio_ivshmem(OE) uio(E)\nCPU: 1 PID: 10818 Comm: kworker/1:16 Tainted: G OE\n5.19.0-rc6-g2eae0556bb9d #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: events mptcp_worker\nRIP: 0010:inet_sock_destruct+0x6d0/0x8e0 net/ipv4/af_inet.c:153\nCode: 21 02 00 00 41 8b 9c 24 28 02 00 00 e9 07 ff ff ff e8 34 4d 91\nf9 89 ee 4c 89 e7 e8 4a 47 60 ff e9 a6 fc ff ff e8 20 4d 91 f9 \u003c0f\u003e 0b\ne9 84 fe ff ff e8 14 4d 91 f9 0f 0b e9 d4 fd ff ff e8 08 4d\nRSP: 0018:ffffc9001b35fa78 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 00000000002879d0 RCX: ffff8881326f3b00\nRDX: 0000000000000000 RSI: ffff8881326f3b00 RDI: 0000000000000002\nRBP: ffff888179662674 R08: ffffffff87e983a0 R09: 0000000000000000\nR10: 0000000000000005 R11: 00000000000004ea R12: ffff888179662400\nR13: ffff888179662428 R14: 0000000000000001 R15: ffff88817e38e258\nFS: 0000000000000000(0000) GS:ffff8881f5f00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020007bc0 CR3: 0000000179592000 CR4: 0000000000150ee0\nCall Trace:\n \u003cTASK\u003e\n __sk_destruct+0x4f/0x8e0 net/core/sock.c:2067\n sk_destruct+0xbd/0xe0 net/core/sock.c:2112\n __sk_free+0xef/0x3d0 net/core/sock.c:2123\n sk_free+0x78/0xa0 net/core/sock.c:2134\n sock_put include/net/sock.h:1927 [inline]\n __mptcp_close_ssk+0x50f/0x780 net/mptcp/protocol.c:2351\n __mptcp_destroy_sock+0x332/0x760 net/mptcp/protocol.c:2828\n mptcp_worker+0x5d2/0xc90 net/mptcp/protocol.c:2586\n process_one_work+0x9cc/0x1650 kernel/workqueue.c:2289\n worker_thread+0x623/0x1070 kernel/workqueue.c:2436\n kthread+0x2e9/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302\n \u003c/TASK\u003e\n\nThe root cause of the problem is that an mptcp-level (re)transmit can\nrace with mptcp_close() and the packet scheduler checks the subflow\nstate before acquiring the socket lock: we can try to (re)transmit on\nan already closed ssk.\n\nFix the issue checking again the subflow socket status under the\nsubflow socket lock protection. Additionally add the missing check\nfor the fallback-to-tcp case.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: do not queue data on closed subflows",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50070"
},
{
"category": "external",
"summary": "RHBZ#2373435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50070"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50070",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50070"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061853-CVE-2022-50070-87b5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061853-CVE-2022-50070-87b5@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: do not queue data on closed subflows"
},
{
"cve": "CVE-2022-50079",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373425"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check correct bounds for stream encoder instances for DCN303\n\n[Why \u0026 How]\neng_id for DCN303 cannot be more than 1, since we have only two\ninstances of stream encoders.\n\nCheck the correct boundary condition for engine ID for DCN303 prevent\nthe potential out of bounds access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amd/display: Check correct bounds for stream encoder instances for DCN303",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50079"
},
{
"category": "external",
"summary": "RHBZ#2373425",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373425"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50079"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061856-CVE-2022-50079-b3a5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061856-CVE-2022-50079-b3a5@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amd/display: Check correct bounds for stream encoder instances for DCN303"
},
{
"cve": "CVE-2022-50093",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373601"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)\n\nKASAN reports:\n\n[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n[ 4.676149][ T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0\n[ 4.683454][ T0]\n[ 4.685638][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1\n[ 4.694331][ T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016\n[ 4.703196][ T0] Call Trace:\n[ 4.706334][ T0] \u003cTASK\u003e\n[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n\nafter converting the type of the first argument (@nr, bit number)\nof arch_test_bit() from `long` to `unsigned long`[0].\n\nUnder certain conditions (for example, when ACPI NUMA is disabled\nvia command line), pxm_to_node() can return %NUMA_NO_NODE (-1).\nIt is valid \u0027magic\u0027 number of NUMA node, but not valid bit number\nto use in bitops.\nnode_online() eventually descends to test_bit() without checking\nfor the input, assuming it\u0027s on caller side (which might be good\nfor perf-critical tasks). There, -1 becomes %ULONG_MAX which leads\nto an insane array index when calculating bit position in memory.\n\nFor now, add an explicit check for @node being not %NUMA_NO_NODE\nbefore calling test_bit(). The actual logics didn\u0027t change here\nat all.\n\n[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue can be triggered during early IOMMU initialization when acpi_map_pxm_to_node() returns NUMA_NO_NODE (i.e., -1). Without a proper check, node_online() accesses an invalid memory address due to the out-of-bounds bit index. High privileges are required (root or kernel mode), and the issue results in a kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50093"
},
{
"category": "external",
"summary": "RHBZ#2373601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373601"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50093"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061801-CVE-2022-50093-efbe@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061801-CVE-2022-50093-efbe@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)"
},
{
"cve": "CVE-2022-50100",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373679"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/core: Do not requeue task on CPU excluded from cpus_mask\n\nThe following warning was triggered on a large machine early in boot on\na distribution kernel but the same problem should also affect mainline.\n\n WARNING: CPU: 439 PID: 10 at ../kernel/workqueue.c:2231 process_one_work+0x4d/0x440\n Call Trace:\n \u003cTASK\u003e\n rescuer_thread+0x1f6/0x360\n kthread+0x156/0x180\n ret_from_fork+0x22/0x30\n \u003c/TASK\u003e\n\nCommit c6e7bd7afaeb (\"sched/core: Optimize ttwu() spinning on p-\u003eon_cpu\")\noptimises ttwu by queueing a task that is descheduling on the wakelist,\nbut does not check if the task descheduling is still allowed to run on that CPU.\n\nIn this warning, the problematic task is a workqueue rescue thread which\nchecks if the rescue is for a per-cpu workqueue and running on the wrong CPU.\nWhile this is early in boot and it should be possible to create workers,\nthe rescue thread may still used if the MAYDAY_INITIAL_TIMEOUT is reached\nor MAYDAY_INTERVAL and on a sufficiently large machine, the rescue\nthread is being used frequently.\n\nTracing confirmed that the task should have migrated properly using the\nstopper thread to handle the migration. However, a parallel wakeup from udev\nrunning on another CPU that does not share CPU cache observes p-\u003eon_cpu and\nuses task_cpu(p), queues the task on the old CPU and triggers the warning.\n\nCheck that the wakee task that is descheduling is still allowed to run\non its current CPU and if not, wait for the descheduling to complete\nand select an allowed CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sched/core: Do not requeue task on CPU excluded from cpus_mask",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50100"
},
{
"category": "external",
"summary": "RHBZ#2373679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373679"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50100"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061803-CVE-2022-50100-bcf0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061803-CVE-2022-50100-bcf0@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sched/core: Do not requeue task on CPU excluded from cpus_mask"
},
{
"cve": "CVE-2022-50111",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373484"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6359: Fix refcount leak bug\n\nIn mt6359_parse_dt() and mt6359_accdet_parse_dt(), we should call\nof_node_put() for the reference returned by of_get_child_by_name()\nwhich has increased the refcount.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ASoC: mt6359: Fix refcount leak bug",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50111"
},
{
"category": "external",
"summary": "RHBZ#2373484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373484"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50111",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50111"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50111",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50111"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-50111-686f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-50111-686f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ASoC: mt6359: Fix refcount leak bug"
},
{
"cve": "CVE-2022-50127",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373477"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix error unwind in rxe_create_qp()\n\nIn the function rxe_create_qp(), rxe_qp_from_init() is called to\ninitialize qp, internally things like the spin locks are not setup until\nrxe_qp_init_req().\n\nIf an error occures before this point then the unwind will call\nrxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()\nwhich will oops when trying to access the uninitialized spinlock.\n\nMove the spinlock initializations earlier before any failures.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/rxe: Fix error unwind in rxe_create_qp()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50127"
},
{
"category": "external",
"summary": "RHBZ#2373477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373477"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50127"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50127",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50127"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-50127-df59@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-50127-df59@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/rxe: Fix error unwind in rxe_create_qp()"
},
{
"cve": "CVE-2022-50129",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373458"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Fix a use-after-free\n\nChange the LIO port members inside struct srpt_port from regular members\ninto pointers. Allocate the LIO port data structures from inside\nsrpt_make_tport() and free these from inside srpt_make_tport(). Keep\nstruct srpt_device as long as either an RDMA port or a LIO target port is\nassociated with it. This patch decouples the lifetime of struct srpt_port\n(controlled by the RDMA core) and struct srpt_port_id (controlled by LIO).\nThis patch fixes the following KASAN complaint:\n\n BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt]\n Read of size 8 at addr ffff888141cc34b8 by task check/5093\n\n Call Trace:\n \u003cTASK\u003e\n show_stack+0x4e/0x53\n dump_stack_lvl+0x51/0x66\n print_address_description.constprop.0.cold+0xea/0x41e\n print_report.cold+0x90/0x205\n kasan_report+0xb9/0xf0\n __asan_load8+0x69/0x90\n srpt_enable_tpg+0x31/0x70 [ib_srpt]\n target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod]\n configfs_write_iter+0x18b/0x210\n new_sync_write+0x1f2/0x2f0\n vfs_write+0x3e3/0x540\n ksys_write+0xbb/0x140\n __x64_sys_write+0x42/0x50\n do_syscall_64+0x34/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/srpt: Fix a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50129"
},
{
"category": "external",
"summary": "RHBZ#2373458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50129"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-50129-dc2e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-50129-dc2e@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/srpt: Fix a use-after-free"
},
{
"cve": "CVE-2022-50130",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373468"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the fbtft module in the Linux kernel. An incorrect order of operations can cause an improper initialization of framebuffer devices, potentially impacting system stability and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: staging: fbtft: core: set smem_len before fb_deferred_io_init call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.8 via RHSA-2023:2951 [1].\n\n[1]. https://access.redhat.com/errata/RHSA-2023:2951",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50130"
},
{
"category": "external",
"summary": "RHBZ#2373468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373468"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50130"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-50130-b9e9@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-50130-b9e9@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: staging: fbtft: core: set smem_len before fb_deferred_io_init call"
},
{
"cve": "CVE-2022-50133",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373682"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci_plat_remove: avoid NULL dereference\n\nSince commit 4736ebd7fcaff1eb8481c140ba494962847d6e0a (\"usb: host:\nxhci-plat: omit shared hcd if either root hub has no ports\")\nxhci-\u003eshared_hcd can be NULL, which causes the following Oops\non reboot:\n\n[ 710.124450] systemd-shutdown[1]: Rebooting.\n[ 710.298861] xhci-hcd xhci-hcd.2.auto: remove, state 4\n[ 710.304217] usb usb3: USB disconnect, device number 1\n[ 710.317441] xhci-hcd xhci-hcd.2.auto: USB bus 3 deregistered\n[ 710.323280] xhci-hcd xhci-hcd.2.auto: remove, state 1\n[ 710.328401] usb usb2: USB disconnect, device number 1\n[ 710.333515] usb 2-3: USB disconnect, device number 2\n[ 710.467649] xhci-hcd xhci-hcd.2.auto: USB bus 2 deregistered\n[ 710.475450] Unable to handle kernel NULL pointer dereference at virtual address 00000000000003b8\n[ 710.484425] Mem abort info:\n[ 710.487265] ESR = 0x0000000096000004\n[ 710.491060] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 710.496427] SET = 0, FnV = 0\n[ 710.499525] EA = 0, S1PTW = 0\n[ 710.502716] FSC = 0x04: level 0 translation fault\n[ 710.507648] Data abort info:\n[ 710.510577] ISV = 0, ISS = 0x00000004\n[ 710.514462] CM = 0, WnR = 0\n[ 710.517480] user pgtable: 4k pages, 48-bit VAs, pgdp=00000008b0050000\n[ 710.523976] [00000000000003b8] pgd=0000000000000000, p4d=0000000000000000\n[ 710.530961] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 710.536551] Modules linked in: rfkill input_leds snd_soc_simple_card snd_soc_simple_card_utils snd_soc_nau8822 designware_i2s snd_soc_core dw_hdmi_ahb_audio snd_pcm_dmaengine arm_ccn panfrost ac97_bus gpu_sched snd_pcm at24 fuse configfs sdhci_of_dwcmshc sdhci_pltfm sdhci nvme led_class mmc_core nvme_core bt1_pvt polynomial tp_serio snd_seq_midi snd_seq_midi_event snd_seq snd_timer snd_rawmidi snd_seq_device snd soundcore efivarfs ipv6\n[ 710.575286] CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted 5.19.0-rc7-00043-gfd8619f4fd54 #1\n[ 710.583822] Hardware name: T-Platforms TF307-MB/BM1BM1-A, BIOS 5.6 07/06/2022\n[ 710.590972] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 710.597949] pc : usb_remove_hcd+0x34/0x1e4\n[ 710.602067] lr : xhci_plat_remove+0x74/0x140\n[ 710.606351] sp : ffff800009f3b7c0\n[ 710.609674] x29: ffff800009f3b7c0 x28: ffff000800960040 x27: 0000000000000000\n[ 710.616833] x26: ffff800008dc22a0 x25: 0000000000000000 x24: 0000000000000000\n[ 710.623992] x23: 0000000000000000 x22: ffff000805465810 x21: ffff000805465800\n[ 710.631149] x20: ffff000800f80000 x19: 0000000000000000 x18: ffffffffffffffff\n[ 710.638307] x17: ffff000805096000 x16: ffff00080633b800 x15: ffff000806537a1c\n[ 710.645465] x14: 0000000000000001 x13: 0000000000000000 x12: ffff00080378d6f0\n[ 710.652621] x11: ffff00080041a900 x10: ffff800009b204e8 x9 : ffff8000088abaa4\n[ 710.659779] x8 : ffff000800960040 x7 : ffff800009409000 x6 : 0000000000000001\n[ 710.666936] x5 : ffff800009241000 x4 : ffff800009241440 x3 : 0000000000000000\n[ 710.674094] x2 : ffff000800960040 x1 : ffff000800960040 x0 : 0000000000000000\n[ 710.681251] Call trace:\n[ 710.683704] usb_remove_hcd+0x34/0x1e4\n[ 710.687467] xhci_plat_remove+0x74/0x140\n[ 710.691400] platform_remove+0x34/0x70\n[ 710.695165] device_remove+0x54/0x90\n[ 710.698753] device_release_driver_internal+0x200/0x270\n[ 710.703992] device_release_driver+0x24/0x30\n[ 710.708273] bus_remove_device+0xe0/0x16c\n[ 710.712293] device_del+0x178/0x390\n[ 710.715797] platform_device_del.part.0+0x24/0x90\n[ 710.720514] platform_device_unregister+0x30/0x50\n[ 710.725232] dwc3_host_exit+0x20/0x30\n[ 710.728907] dwc3_remove+0x174/0x1b0\n[ 710.732494] platform_remove+0x34/0x70\n[ 710.736254] device_remove+0x54/0x90\n[ 710.739840] device_release_driver_internal+0x200/0x270\n[ 710.745078] device_release_driver+0x24/0x30\n[ 710.749359] bus_remove_device+0xe0/0x16c\n[ 710.753380] device_del+0x178/0x390\n[ 710.756881] platform_device_del.part\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb: xhci_plat_remove: avoid NULL dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50133"
},
{
"category": "external",
"summary": "RHBZ#2373682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50133"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50133-6189@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50133-6189@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: usb: xhci_plat_remove: avoid NULL dereference"
},
{
"cve": "CVE-2022-50135",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373655"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the rdma_rxe module in the Linux kernel. A NULL pointer dereference can be triggered when an error occurs due to an improper check, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/rxe: Fix BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.8 and 9.3 via RHSA-2023:2951 [1] and RHSA-2023:6583 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2023:2951\n\n[2]. https://access.redhat.com/errata/RHSA-2023:6583",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50135"
},
{
"category": "external",
"summary": "RHBZ#2373655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373655"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50135"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-50135-585a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-50135-585a@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/rxe: Fix BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup"
},
{
"cve": "CVE-2022-50136",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373548"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event\n\nIf siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn\u0027t\nbeen received completely, and should not report IW_CM_EVENT_CONNECT_REPLY\nin this case. This may trigger a call trace in iw_cm. A simple way to\ntrigger this:\n server: ib_send_lat\n client: ib_send_lat -R \u003cserver_ip\u003e\n\nThe call trace looks like this:\n\n kernel BUG at drivers/infiniband/core/iwcm.c:894!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n \u003c...\u003e\n Workqueue: iw_cm_wq cm_work_handler [iw_cm]\n Call Trace:\n \u003cTASK\u003e\n cm_work_handler+0x1dd/0x370 [iw_cm]\n process_one_work+0x1e2/0x3b0\n worker_thread+0x49/0x2e0\n ? rescuer_thread+0x370/0x370\n kthread+0xe5/0x110\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50136"
},
{
"category": "external",
"summary": "RHBZ#2373548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50136"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-50136-f85e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-50136-f85e@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event"
},
{
"cve": "CVE-2022-50137",
"cwe": {
"id": "CWE-826",
"name": "Premature Release of Resource During Expected Lifetime"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373514"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a window for use-after-free\n\nDuring a destroy CQ an interrupt may cause processing of a CQE after CQ\nresources are freed by irdma_cq_free_rsrc(). Fix this by moving the call\nto irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is\ncalled under the cq_lock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a window for use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50137"
},
{
"category": "external",
"summary": "RHBZ#2373514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50137",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50137"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-50137-c539@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-50137-c539@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a window for use-after-free"
},
{
"cve": "CVE-2022-50138",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373512"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the qedr module in the Linux kernel. A missing release of allocated memory when an error occurs will cause a memory leak, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.8 and 9.2 via RHSA-2023:2951 [1] and RHSA-2023:2458 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2023:2951\n\n[2]. https://access.redhat.com/errata/RHSA-2023:2458",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50138"
},
{
"category": "external",
"summary": "RHBZ#2373512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373512"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50138"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50138",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50138"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-50138-cd9d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-50138-cd9d@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()"
},
{
"cve": "CVE-2022-50149",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373555"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential deadlock in __driver_attach\n\nIn __driver_attach function, There are also AA deadlock problem,\nlike the commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\n\nstack like commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\nlist below:\n In __driver_attach function, The lock holding logic is as follows:\n ...\n __driver_attach\n if (driver_allows_async_probing(drv))\n device_lock(dev) // get lock dev\n async_schedule_dev(__driver_attach_async_helper, dev); // func\n async_schedule_node\n async_schedule_node_domain(func)\n entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);\n /* when fail or work limit, sync to execute func, but\n __driver_attach_async_helper will get lock dev as\n will, which will lead to A-A deadlock. */\n if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK) {\n func;\n else\n queue_work_node(node, system_unbound_wq, \u0026entry-\u003ework)\n device_unlock(dev)\n\n As above show, when it is allowed to do async probes, because of\n out of memory or work limit, async work is not be allowed, to do\n sync execute instead. it will lead to A-A deadlock because of\n __driver_attach_async_helper getting lock dev.\n\nReproduce:\nand it can be reproduce by make the condition\n(if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK)) untenable, like\nbelow:\n\n[ 370.785650] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables\nthis message.\n[ 370.787154] task:swapper/0 state:D stack: 0 pid: 1 ppid:\n0 flags:0x00004000\n[ 370.788865] Call Trace:\n[ 370.789374] \u003cTASK\u003e\n[ 370.789841] __schedule+0x482/0x1050\n[ 370.790613] schedule+0x92/0x1a0\n[ 370.791290] schedule_preempt_disabled+0x2c/0x50\n[ 370.792256] __mutex_lock.isra.0+0x757/0xec0\n[ 370.793158] __mutex_lock_slowpath+0x1f/0x30\n[ 370.794079] mutex_lock+0x50/0x60\n[ 370.794795] __device_driver_lock+0x2f/0x70\n[ 370.795677] ? driver_probe_device+0xd0/0xd0\n[ 370.796576] __driver_attach_async_helper+0x1d/0xd0\n[ 370.797318] ? driver_probe_device+0xd0/0xd0\n[ 370.797957] async_schedule_node_domain+0xa5/0xc0\n[ 370.798652] async_schedule_node+0x19/0x30\n[ 370.799243] __driver_attach+0x246/0x290\n[ 370.799828] ? driver_allows_async_probing+0xa0/0xa0\n[ 370.800548] bus_for_each_dev+0x9d/0x130\n[ 370.801132] driver_attach+0x22/0x30\n[ 370.801666] bus_add_driver+0x290/0x340\n[ 370.802246] driver_register+0x88/0x140\n[ 370.802817] ? virtio_scsi_init+0x116/0x116\n[ 370.803425] scsi_register_driver+0x1a/0x30\n[ 370.804057] init_sd+0x184/0x226\n[ 370.804533] do_one_initcall+0x71/0x3a0\n[ 370.805107] kernel_init_freeable+0x39a/0x43a\n[ 370.805759] ? rest_init+0x150/0x150\n[ 370.806283] kernel_init+0x26/0x230\n[ 370.806799] ret_from_fork+0x1f/0x30\n\nTo fix the deadlock, move the async_schedule_dev outside device_lock,\nas we can see, in async_schedule_node_domain, the parameter of\nqueue_work_node is system_unbound_wq, so it can accept concurrent\noperations. which will also not change the code logic, and will\nnot lead to deadlock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: driver core: fix potential deadlock in __driver_attach",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50149"
},
{
"category": "external",
"summary": "RHBZ#2373555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50149"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-50149-5467@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-50149-5467@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: driver core: fix potential deadlock in __driver_attach"
},
{
"cve": "CVE-2022-50172",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373456"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg\n\nFree the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50172"
},
{
"category": "external",
"summary": "RHBZ#2373456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50172"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061829-CVE-2022-50172-0d81@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061829-CVE-2022-50172-0d81@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg"
},
{
"cve": "CVE-2022-50181",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373666"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-gpu: fix a missing check to avoid NULL dereference\n\n\u0027cache_ent\u0027 could be set NULL inside virtio_gpu_cmd_get_capset()\nand it will lead to a NULL dereference by a lately use of it\n(i.e., ptr = cache_ent-\u003ecaps_cache). Fix it with a NULL check.\n\n\n[ kraxel: minor codestyle fixup ]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-gpu: fix a missing check to avoid NULL dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50181"
},
{
"category": "external",
"summary": "RHBZ#2373666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373666"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50181"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50181",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50181"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50181-f573@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50181-f573@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: virtio-gpu: fix a missing check to avoid NULL dereference"
},
{
"cve": "CVE-2022-50185",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373431"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()\n\nThe last case label can write two buffers \u0027mc_reg_address[j]\u0027 and\n\u0027mc_data[j]\u0027 with \u0027j\u0027 offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE\nsince there are no checks for this value in both case labels after the\nlast \u0027j++\u0027.\n\nInstead of changing \u0027\u003e\u0027 to \u0027\u003e=\u0027 there, add the bounds check at the start\nof the second \u0027case\u0027 (the first one already has it).\n\nAlso, remove redundant last checks for \u0027j\u0027 index bigger than array size.\nThe expression is always false. Moreover, before or after the patch\n\u0027table-\u003elast\u0027 can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it\nseems it can be a valid value.\n\nDetected using the static analysis tool - Svace.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50185"
},
{
"category": "external",
"summary": "RHBZ#2373431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50185"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061834-CVE-2022-50185-b741@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061834-CVE-2022-50185-b741@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()"
},
{
"cve": "CVE-2022-50189",
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373414"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntools/power turbostat: Fix file pointer leak\n\nCurrently if a fscanf fails then an early return leaks an open\nfile pointer. Fix this by fclosing the file before the return.\nDetected using static analysis with cppcheck:\n\ntools/power/x86/turbostat/turbostat.c:2039:3: error: Resource leak: fp [resourceLeak]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tools/power turbostat: Fix file pointer leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50189"
},
{
"category": "external",
"summary": "RHBZ#2373414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373414"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50189"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50189-75d2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50189-75d2@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tools/power turbostat: Fix file pointer leak"
},
{
"cve": "CVE-2022-50211",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373662"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd-raid10: fix KASAN warning\n\nThere\u0027s a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\n\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\n\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n print_report.cold+0x45/0x57a\n ? __lock_text_start+0x18/0x18\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n kasan_report+0xa8/0xe0\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n raid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\n remove_and_add_spares+0x367/0x8a0 [md_mod]\n ? super_written+0x1c0/0x1c0 [md_mod]\n ? mutex_trylock+0xac/0x120\n ? _raw_spin_lock+0x72/0xc0\n ? _raw_spin_lock_bh+0xc0/0xc0\n md_check_recovery+0x848/0x960 [md_mod]\n raid10d+0xcf/0x3360 [raid10]\n ? sched_clock_cpu+0x185/0x1a0\n ? rb_erase+0x4d4/0x620\n ? var_wake_function+0xe0/0xe0\n ? psi_group_change+0x411/0x500\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? raid10_sync_request+0x36c0/0x36c0 [raid10]\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_unlock_irqrestore+0x19/0x40\n ? del_timer_sync+0xa9/0x100\n ? try_to_del_timer_sync+0xc0/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? _raw_spin_unlock_irq+0x11/0x24\n ? __list_del_entry_valid+0x68/0xa0\n ? finish_wait+0xa3/0x100\n md_thread+0x161/0x260 [md_mod]\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? prepare_to_wait_event+0x2c0/0x2c0\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n kthread+0x148/0x180\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nAllocated by task 124495:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x80/0xa0\n setup_conf+0x140/0x5c0 [raid10]\n raid10_run+0x4cd/0x740 [raid10]\n md_run+0x6f9/0x1300 [md_mod]\n raid_ctr+0x2531/0x4ac0 [dm_raid]\n dm_table_add_target+0x2b0/0x620 [dm_mod]\n table_load+0x1c8/0x400 [dm_mod]\n ctl_ioctl+0x29e/0x560 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n __do_compat_sys_ioctl+0xfa/0x160\n do_syscall_64+0x90/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\nL __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\n __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe buggy address belongs to the object at ffff889108f3d200\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff889108f3d200, ffff889108f3d300)\n\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff889108f3d280: 00 00\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: md-raid10: fix KASAN warning",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50211"
},
{
"category": "external",
"summary": "RHBZ#2373662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373662"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50211"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50211-393a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50211-393a@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: md-raid10: fix KASAN warning"
},
{
"cve": "CVE-2022-50221",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373496"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/fb-helper: Fix out-of-bounds access\n\nClip memory range to screen-buffer size to avoid out-of-bounds access\nin fbdev deferred I/O\u0027s damage handling.\n\nFbdev\u0027s deferred I/O can only track pages. From the range of pages, the\ndamage handler computes the clipping rectangle for the display update.\nIf the fbdev screen buffer ends near the beginning of a page, that page\ncould contain more scanlines. The damage handler would then track these\nnon-existing scanlines as dirty and provoke an out-of-bounds access\nduring the screen update. Hence, clip the maximum memory range to the\nsize of the screen buffer.\n\nWhile at it, rename the variables min/max to min_off/max_off in\ndrm_fb_helper_deferred_io(). This avoids confusion with the macros of\nthe same name.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/fb-helper: Fix out-of-bounds access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50221"
},
{
"category": "external",
"summary": "RHBZ#2373496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50221"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50221-1b80@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50221-1b80@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/fb-helper: Fix out-of-bounds access"
},
{
"cve": "CVE-2022-50229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373460"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: bcd2000: Fix a UAF bug on the error path of probing\n\nWhen the driver fails in snd_card_register() at probe time, it will free\nthe \u0027bcd2k-\u003emidi_out_urb\u0027 before killing it, which may cause a UAF bug.\n\nThe following log can reveal it:\n\n[ 50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n[ 50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0\n[ 50.729530] Call Trace:\n[ 50.732899] bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n\nFix this by adding usb_kill_urb() before usb_free_urb().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ALSA: bcd2000: Fix a UAF bug on the error path of probing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50229"
},
{
"category": "external",
"summary": "RHBZ#2373460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50229"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061850-CVE-2022-50229-702e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061850-CVE-2022-50229-702e@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ALSA: bcd2000: Fix a UAF bug on the error path of probing"
},
{
"cve": "CVE-2022-50235",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2025-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395362"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READDIR\n\nRestore the previous limit on the @count argument to prevent a\nbuffer overflow attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50235"
},
{
"category": "external",
"summary": "RHBZ#2395362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50235"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50235",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50235"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/T"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR"
},
{
"cve": "CVE-2022-50243",
"cwe": {
"id": "CWE-324",
"name": "Use of a Key Past its Expiration Date"
},
"discovery_date": "2025-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395428"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: handle the error returned from sctp_auth_asoc_init_active_key\n\nWhen it returns an error from sctp_auth_asoc_init_active_key(), the\nactive_key is actually not updated. The old sh_key will be freeed\nwhile it\u0027s still used as active key in asoc. Then an use-after-free\nwill be triggered when sending patckets, as found by syzbot:\n\n sctp_auth_shkey_hold+0x22/0xa0 net/sctp/auth.c:112\n sctp_set_owner_w net/sctp/socket.c:132 [inline]\n sctp_sendmsg_to_asoc+0xbd5/0x1a20 net/sctp/socket.c:1863\n sctp_sendmsg+0x1053/0x1d50 net/sctp/socket.c:2025\n inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:819\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:734\n\nThis patch is to fix it by not replacing the sh_key when it returns\nerrors from sctp_auth_asoc_init_active_key() in sctp_auth_set_key().\nFor sctp_auth_set_active_key(), old active_key_id will be set back\nto asoc-\u003eactive_key_id when the same thing happens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: handle the error returned from sctp_auth_asoc_init_active_key",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50243"
},
{
"category": "external",
"summary": "RHBZ#2395428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50243"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50243",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50243"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50243-4311@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50243-4311@gregkh/T"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: handle the error returned from sctp_auth_asoc_init_active_key"
},
{
"cve": "CVE-2022-50299",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395240"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Replace snprintf with scnprintf\n\nCurrent code produces a warning as shown below when total characters\nin the constituent block device names plus the slashes exceeds 200.\nsnprintf() returns the number of characters generated from the given\ninput, which could cause the expression \u201c200 \u2013 len\u201d to wrap around\nto a large positive number. Fix this by using scnprintf() instead,\nwhich returns the actual number of characters written into the buffer.\n\n[ 1513.267938] ------------[ cut here ]------------\n[ 1513.267943] WARNING: CPU: 15 PID: 37247 at \u003csnip\u003e/lib/vsprintf.c:2509 vsnprintf+0x2c8/0x510\n[ 1513.267944] Modules linked in: \u003csnip\u003e\n[ 1513.267969] CPU: 15 PID: 37247 Comm: mdadm Not tainted 5.4.0-1085-azure #90~18.04.1-Ubuntu\n[ 1513.267969] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[ 1513.267971] RIP: 0010:vsnprintf+0x2c8/0x510\n\u003c-snip-\u003e\n[ 1513.267982] Call Trace:\n[ 1513.267986] snprintf+0x45/0x70\n[ 1513.267990] ? disk_name+0x71/0xa0\n[ 1513.267993] dump_zones+0x114/0x240 [raid0]\n[ 1513.267996] ? _cond_resched+0x19/0x40\n[ 1513.267998] raid0_run+0x19e/0x270 [raid0]\n[ 1513.268000] md_run+0x5e0/0xc50\n[ 1513.268003] ? security_capable+0x3f/0x60\n[ 1513.268005] do_md_run+0x19/0x110\n[ 1513.268006] md_ioctl+0x195e/0x1f90\n[ 1513.268007] blkdev_ioctl+0x91f/0x9f0\n[ 1513.268010] block_ioctl+0x3d/0x50\n[ 1513.268012] do_vfs_ioctl+0xa9/0x640\n[ 1513.268014] ? __fput+0x162/0x260\n[ 1513.268016] ksys_ioctl+0x75/0x80\n[ 1513.268017] __x64_sys_ioctl+0x1a/0x20\n[ 1513.268019] do_syscall_64+0x5e/0x200\n[ 1513.268021] entry_SYSCALL_64_after_hwframe+0x44/0xa9",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: md: Replace snprintf with scnprintf",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50299"
},
{
"category": "external",
"summary": "RHBZ#2395240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50299"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50299",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50299"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50299-9449@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50299-9449@gregkh/T"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: md: Replace snprintf with scnprintf"
},
{
"cve": "CVE-2022-50318",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2025-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395235"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()\n\npci_get_device() will increase the reference count for the returned\n\u0027dev\u0027. We need to call pci_dev_put() to decrease the reference count.\nSince \u0027dev\u0027 is only used in pci_read_config_dword(), let\u0027s add\npci_dev_put() right after it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50318"
},
{
"category": "external",
"summary": "RHBZ#2395235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395235"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50318"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/T"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()"
},
{
"cve": "CVE-2022-50325",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395270"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: avs: Fix potential RX buffer overflow\n\nIf an event caused firmware to return invalid RX size for\nLARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes.\nFix by utilizing min_t().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ASoC: Intel: avs: Fix potential RX buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please note that this vulnerability only impacts two unsupported streams, RHEL-8.7 and RHEL-9.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50325"
},
{
"category": "external",
"summary": "RHBZ#2395270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50325",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50325"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50325-d6bb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50325-d6bb@gregkh/T"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ASoC: Intel: avs: Fix potential RX buffer overflow"
},
{
"cve": "CVE-2022-50350",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395874"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix a race condition between login_work and the login thread\n\nIn case a malicious initiator sends some random data immediately after a\nlogin PDU; the iscsi_target_sk_data_ready() callback will schedule the\nlogin_work and, at the same time, the negotiation may end without clearing\nthe LOGIN_FLAGS_INITIAL_PDU flag (because no additional PDU exchanges are\nrequired to complete the login).\n\nThe login has been completed but the login_work function will find the\nLOGIN_FLAGS_INITIAL_PDU flag set and will never stop from rescheduling\nitself; at this point, if the initiator drops the connection, the\niscsit_conn structure will be freed, login_work will dereference a released\nsocket structure and the kernel crashes.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000230\nPF: supervisor write access in kernel mode\nPF: error_code(0x0002) - not-present page\nWorkqueue: events iscsi_target_do_login_rx [iscsi_target_mod]\nRIP: 0010:_raw_read_lock_bh+0x15/0x30\nCall trace:\n iscsi_target_do_login_rx+0x75/0x3f0 [iscsi_target_mod]\n process_one_work+0x1e8/0x3c0\n\nFix this bug by forcing login_work to stop after the login has been\ncompleted and the socket callbacks have been restored.\n\nAdd a comment to clearify the return values of iscsi_target_do_login()",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: target: iscsi: Fix a race condition between login_work and the login thread",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50350"
},
{
"category": "external",
"summary": "RHBZ#2395874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50350",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50350"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50350-31bb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50350-31bb@gregkh/T"
}
],
"release_date": "2025-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: target: iscsi: Fix a race condition between login_work and the login thread"
},
{
"cve": "CVE-2022-50381",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2025-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396420"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix a crash in mempool_free\n\nThere\u0027s a crash in mempool_free when running the lvm test\nshell/lvchange-rebuild-raid.sh.\n\nThe reason for the crash is this:\n* super_written calls atomic_dec_and_test(\u0026mddev-\u003epending_writes) and\n wake_up(\u0026mddev-\u003esb_wait). Then it calls rdev_dec_pending(rdev, mddev)\n and bio_put(bio).\n* so, the process that waited on sb_wait and that is woken up is racing\n with bio_put(bio).\n* if the process wins the race, it calls bioset_exit before bio_put(bio)\n is executed.\n* bio_put(bio) attempts to free a bio into a destroyed bio set - causing\n a crash in mempool_free.\n\nWe fix this bug by moving bio_put before atomic_dec_and_test.\n\nWe also move rdev_dec_pending before atomic_dec_and_test as suggested by\nNeil Brown.\n\nThe function md_end_flush has a similar bug - we must call bio_put before\nwe decrement the number of in-progress bios.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 11557f0067 P4D 11557f0067 PUD 0\n Oops: 0002 [#1] PREEMPT SMP\n CPU: 0 PID: 73 Comm: kworker/0:1 Not tainted 6.1.0-rc3 #5\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\n Workqueue: kdelayd flush_expired_bios [dm_delay]\n RIP: 0010:mempool_free+0x47/0x80\n Code: 48 89 ef 5b 5d ff e0 f3 c3 48 89 f7 e8 32 45 3f 00 48 63 53 08 48 89 c6 3b 53 04 7d 2d 48 8b 43 10 8d 4a 01 48 89 df 89 4b 08 \u003c48\u003e 89 2c d0 e8 b0 45 3f 00 48 8d 7b 30 5b 5d 31 c9 ba 01 00 00 00\n RSP: 0018:ffff88910036bda8 EFLAGS: 00010093\n RAX: 0000000000000000 RBX: ffff8891037b65d8 RCX: 0000000000000001\n RDX: 0000000000000000 RSI: 0000000000000202 RDI: ffff8891037b65d8\n RBP: ffff8891447ba240 R08: 0000000000012908 R09: 00000000003d0900\n R10: 0000000000000000 R11: 0000000000173544 R12: ffff889101a14000\n R13: ffff8891562ac300 R14: ffff889102b41440 R15: ffffe8ffffa00d05\n FS: 0000000000000000(0000) GS:ffff88942fa00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000001102e99000 CR4: 00000000000006b0\n Call Trace:\n \u003cTASK\u003e\n clone_endio+0xf4/0x1c0 [dm_mod]\n clone_endio+0xf4/0x1c0 [dm_mod]\n __submit_bio+0x76/0x120\n submit_bio_noacct_nocheck+0xb6/0x2a0\n flush_expired_bios+0x28/0x2f [dm_delay]\n process_one_work+0x1b4/0x300\n worker_thread+0x45/0x3e0\n ? rescuer_thread+0x380/0x380\n kthread+0xc2/0x100\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n Modules linked in: brd dm_delay dm_raid dm_mod af_packet uvesafb cfbfillrect cfbimgblt cn cfbcopyarea fb font fbdev tun autofs4 binfmt_misc configfs ipv6 virtio_rng virtio_balloon rng_core virtio_net pcspkr net_failover failover qemu_fw_cfg button mousedev raid10 raid456 libcrc32c async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_tx raid1 raid0 md_mod sd_mod t10_pi crc64_rocksoft crc64 virtio_scsi scsi_mod evdev psmouse bsg scsi_common [last unloaded: brd]\n CR2: 0000000000000000\n ---[ end trace 0000000000000000 ]---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: md: fix a crash in mempool_free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50381"
},
{
"category": "external",
"summary": "RHBZ#2396420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396420"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50381"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50381-b83f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50381-b83f@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: md: fix a crash in mempool_free"
},
{
"cve": "CVE-2022-50408",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396506"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()\n\n\u003e ret = brcmf_proto_tx_queue_data(drvr, ifp-\u003eifidx, skb);\n\nmay be schedule, and then complete before the line\n\n\u003e ndev-\u003estats.tx_bytes += skb-\u003elen;\n\n[ 46.912801] ==================================================================\n[ 46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[ 46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328\n[ 46.935991]\n[ 46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G O 5.4.199-[REDACTED] #1\n[ 46.947255] Hardware name: [REDACTED]\n[ 46.954568] Call trace:\n[ 46.957037] dump_backtrace+0x0/0x2b8\n[ 46.960719] show_stack+0x24/0x30\n[ 46.964052] dump_stack+0x128/0x194\n[ 46.967557] print_address_description.isra.0+0x64/0x380\n[ 46.972877] __kasan_report+0x1d4/0x240\n[ 46.976723] kasan_report+0xc/0x18\n[ 46.980138] __asan_report_load4_noabort+0x18/0x20\n[ 46.985027] brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[ 46.990613] dev_hard_start_xmit+0x1bc/0xda0\n[ 46.994894] sch_direct_xmit+0x198/0xd08\n[ 46.998827] __qdisc_run+0x37c/0x1dc0\n[ 47.002500] __dev_queue_xmit+0x1528/0x21f8\n[ 47.006692] dev_queue_xmit+0x24/0x30\n[ 47.010366] neigh_resolve_output+0x37c/0x678\n[ 47.014734] ip_finish_output2+0x598/0x2458\n[ 47.018927] __ip_finish_output+0x300/0x730\n[ 47.023118] ip_output+0x2e0/0x430\n[ 47.026530] ip_local_out+0x90/0x140\n[ 47.030117] igmpv3_sendpack+0x14c/0x228\n[ 47.034049] igmpv3_send_cr+0x384/0x6b8\n[ 47.037895] igmp_ifc_timer_expire+0x4c/0x118\n[ 47.042262] call_timer_fn+0x1cc/0xbe8\n[ 47.046021] __run_timers+0x4d8/0xb28\n[ 47.049693] run_timer_softirq+0x24/0x40\n[ 47.053626] __do_softirq+0x2c0/0x117c\n[ 47.057387] irq_exit+0x2dc/0x388\n[ 47.060715] __handle_domain_irq+0xb4/0x158\n[ 47.064908] gic_handle_irq+0x58/0xb0\n[ 47.068581] el0_irq_naked+0x50/0x5c\n[ 47.072162]\n[ 47.073665] Allocated by task 328:\n[ 47.077083] save_stack+0x24/0xb0\n[ 47.080410] __kasan_kmalloc.isra.0+0xc0/0xe0\n[ 47.084776] kasan_slab_alloc+0x14/0x20\n[ 47.088622] kmem_cache_alloc+0x15c/0x468\n[ 47.092643] __alloc_skb+0xa4/0x498\n[ 47.096142] igmpv3_newpack+0x158/0xd78\n[ 47.099987] add_grhead+0x210/0x288\n[ 47.103485] add_grec+0x6b0/0xb70\n[ 47.106811] igmpv3_send_cr+0x2e0/0x6b8\n[ 47.110657] igmp_ifc_timer_expire+0x4c/0x118\n[ 47.115027] call_timer_fn+0x1cc/0xbe8\n[ 47.118785] __run_timers+0x4d8/0xb28\n[ 47.122457] run_timer_softirq+0x24/0x40\n[ 47.126389] __do_softirq+0x2c0/0x117c\n[ 47.130142]\n[ 47.131643] Freed by task 180:\n[ 47.134712] save_stack+0x24/0xb0\n[ 47.138041] __kasan_slab_free+0x108/0x180\n[ 47.142146] kasan_slab_free+0x10/0x18\n[ 47.145904] slab_free_freelist_hook+0xa4/0x1b0\n[ 47.150444] kmem_cache_free+0x8c/0x528\n[ 47.154292] kfree_skbmem+0x94/0x108\n[ 47.157880] consume_skb+0x10c/0x5a8\n[ 47.161466] __dev_kfree_skb_any+0x88/0xa0\n[ 47.165598] brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]\n[ 47.171023] brcmf_txfinalize+0xec/0x190 [brcmfmac]\n[ 47.176016] brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]\n[ 47.182056] brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]\n[ 47.187568] brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]\n[ 47.192529] brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]\n[ 47.197859] process_one_work+0x7fc/0x1a80\n[ 47.201965] worker_thread+0x31c/0xc40\n[ 47.205726] kthread+0x2d8/0x370\n[ 47.208967] ret_from_fork+0x10/0x18\n[ 47.212546]\n[ 47.214051] The buggy address belongs to the object at ffffff803f588280\n[ 47.214051] which belongs to the cache skbuff_head_cache of size 208\n[ 47.227086] The buggy address is located 104 bytes inside of\n[ 47.227086] 208-byte region [ffffff803f588280, ffffff803f588350)\n[ 47.238814] The buggy address belongs to the page:\n[ 47.243618] page:ffffffff00dd6200 refcount:1 mapcou\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A Use-After-Free vulnerability was found in brcmf_netdev_start_xmit() in the Broadcom brcmfmac driver.\nThe function updated ndev-\u003estats.tx_bytes after calling brcmf_proto_tx_queue_data(), which may complete asynchronously and free the skb object before accessing it.\nThe patch stores skb-\u003elen in a local variable before the transmission call to prevent dereferencing freed memory.\nPrivilege required is low (PR:L) since the issue is triggered during normal packet transmission from a network interface, accessible to local processes using networking APIs.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50408"
},
{
"category": "external",
"summary": "RHBZ#2396506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50408"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module brcmfmac from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()"
},
{
"cve": "CVE-2022-50410",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396536"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READ\n\nSince before the git era, NFSD has conserved the number of pages\nheld by each nfsd thread by combining the RPC receive and send\nbuffers into a single array of pages. This works because there are\nno cases where an operation needs a large RPC Call message and a\nlarge RPC Reply at the same time.\n\nOnce an RPC Call has been received, svc_process() updates\nsvc_rqst::rq_res to describe the part of rq_pages that can be\nused for constructing the Reply. This means that the send buffer\n(rq_res) shrinks when the received RPC record containing the RPC\nCall is large.\n\nA client can force this shrinkage on TCP by sending a correctly-\nformed RPC Call header contained in an RPC record that is\nexcessively large. The full maximum payload size cannot be\nconstructed in that case.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A logic flaw in the NFSv2 server implementation could allow a remote NFS client to trigger a send-buffer overflow by sending a valid but excessively large RPC Call header, resulting in an oversized READ request exceeding the available response buffer. Successful exploitation could lead to memory corruption and potential denial of service (kernel crash).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50410"
},
{
"category": "external",
"summary": "RHBZ#2396536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50410",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50410"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv2 READ"
},
{
"cve": "CVE-2022-50418",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2025-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396520"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()\n\nmhi_alloc_controller() allocates a memory space for mhi_ctrl. When gets\nsome error, mhi_ctrl should be freed with mhi_free_controller(). But\nwhen ath11k_mhi_read_addr_from_dt() fails, the function returns without\ncalling mhi_free_controller(), which will lead to a memory leak.\n\nWe can fix it by calling mhi_free_controller() when\nath11k_mhi_read_addr_from_dt() fails.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50418"
},
{
"category": "external",
"summary": "RHBZ#2396520",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396520"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50418"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50418-deac@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50418-deac@gregkh/T"
}
],
"release_date": "2025-09-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()"
},
{
"cve": "CVE-2022-50425",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-10-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2400803"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly\n\nWhen an extended state component is not present in fpstate, but in init\nstate, the function copies from init_fpstate via copy_feature().\n\nBut, dynamic states are not present in init_fpstate because of all-zeros\ninit states. Then retrieving them from init_fpstate will explode like this:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n ...\n RIP: 0010:memcpy_erms+0x6/0x10\n ? __copy_xstate_to_uabi_buf+0x381/0x870\n fpu_copy_guest_fpstate_to_uabi+0x28/0x80\n kvm_arch_vcpu_ioctl+0x14c/0x1460 [kvm]\n ? __this_cpu_preempt_check+0x13/0x20\n ? vmx_vcpu_put+0x2e/0x260 [kvm_intel]\n kvm_vcpu_ioctl+0xea/0x6b0 [kvm]\n ? kvm_vcpu_ioctl+0xea/0x6b0 [kvm]\n ? __fget_light+0xd4/0x130\n __x64_sys_ioctl+0xe3/0x910\n ? debug_smp_processor_id+0x17/0x20\n ? fpregs_assert_state_consistent+0x27/0x50\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAdjust the \u0027mask\u0027 to zero out the userspace buffer for the features that\nare not available both from fpstate and from init_fpstate.\n\nThe dynamic features depend on the compacted XSAVE format. Ensure it is\nenabled before reading XCOMP_BV in init_fpstate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50425"
},
{
"category": "external",
"summary": "RHBZ#2400803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50425"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50425-6722@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50425-6722@gregkh/T"
}
],
"release_date": "2025-10-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly"
},
{
"cve": "CVE-2022-50431",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2025-10-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2400812"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()\n\ndev_set_name() in soundbus_add_one() allocates memory for name, it need be\nfreed when of_device_register() fails, call soundbus_dev_put() to give up\nthe reference that hold in device_initialize(), so that it can be freed in\nkobject_cleanup() when the refcount hit to 0. And other resources are also\nfreed in i2sbus_release_dev(), so it can return 0 directly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50431"
},
{
"category": "external",
"summary": "RHBZ#2400812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50431",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50431"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50431",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50431"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50431-b165@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50431-b165@gregkh/T"
}
],
"release_date": "2025-10-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()"
},
{
"cve": "CVE-2022-50467",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-10-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2400723"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID\n\nAn error case exit from lpfc_cmpl_ct_cmd_gft_id() results in a call to\nlpfc_nlp_put() with a null pointer to a nodelist structure.\n\nChanged lpfc_cmpl_ct_cmd_gft_id() to initialize nodelist pointer upon\nentry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50467"
},
{
"category": "external",
"summary": "RHBZ#2400723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50467"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50467-13ec@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50467-13ec@gregkh/T"
}
],
"release_date": "2025-10-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID"
},
{
"cve": "CVE-2022-50482",
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401576"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Clean up si_domain in the init_dmars() error path\n\nA splat from kmem_cache_destroy() was seen with a kernel prior to\ncommit ee2653bbe89d (\"iommu/vt-d: Remove domain and devinfo mempool\")\nwhen there was a failure in init_dmars(), because the iommu_domain\ncache still had objects. While the mempool code is now gone, there\nstill is a leak of the si_domain memory if init_dmars() fails. So\nclean up si_domain in the init_dmars() error path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iommu/vt-d: Clean up si_domain in the init_dmars() error path",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The init_dmars function performs IOMMU initialization and allocates the si_domain (shared identity domain) for devices that can bypass IOMMU translation. When initialization fails partway through, the error path returns without cleaning up the si_domain allocation. Since this is a boot-time initialization function, the leak occurs once per failed initialization attempt. While the leak was originally detected through kmem_cache errors, even after mempool removal the underlying memory leak persists. The issue requires conditions that cause IOMMU initialization to fail, which can occur due to hardware issues, misconfigurations, or resource constraints during boot.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50482"
},
{
"category": "external",
"summary": "RHBZ#2401576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50482",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50482"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50482-0291@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50482-0291@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: iommu/vt-d: Clean up si_domain in the init_dmars() error path"
},
{
"cve": "CVE-2022-50484",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401488"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix potential memory leaks\n\nWhen the driver hits -ENOMEM at allocating a URB or a buffer, it\naborts and goes to the error path that releases the all previously\nallocated resources. However, when -ENOMEM hits at the middle of the\nsync EP URB allocation loop, the partially allocated URBs might be\nleft without released, because ep-\u003enurbs is still zero at that point.\n\nFix it by setting ep-\u003enurbs at first, so that the error handler loops\nover the full URB list.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ALSA: usb-audio: Fix potential memory leaks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "USB audio devices often use isochronous endpoints for audio streaming, with separate synchronization endpoints for clock recovery. During initialization, the driver allocates multiple URBs (USB Request Blocks) for these endpoints. The allocation happens in a loop: create URB, allocate buffer, repeat. The ep-\u003enurbs field tracks how many URBs have been successfully allocated. Here\u0027s the problem: ep-\u003enurbs is only set after the entire loop completes successfully. If allocation fails midway\u2014say, the driver successfully allocates 5 URBs but fails on the 6th due to -ENOMEM\u2014the error handler is supposed to clean up. It loops from 0 to ep-\u003enurbs, freeing each URB. But since ep-\u003enurbs is still zero (it was never updated), the loop doesn\u0027t execute at all. The 5 successfully allocated URBs are simply abandoned. Each time USB audio initialization fails under memory pressure, more URBs leak. The fix is simple: set ep-\u003enurbs before starting the loop, so the cleanup knows how far to iterate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50484"
},
{
"category": "external",
"summary": "RHBZ#2401488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50484"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50484",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50484"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50484-1a6a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50484-1a6a@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ALSA: usb-audio: Fix potential memory leaks"
},
{
"cve": "CVE-2022-50487",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401498"
}
],
"notes": [
{
"category": "description",
"text": "A buffer management flaw was found in the Linux kernel\u0027s NFS server implementation in the NFSv3 READDIR operation handling. \nA remote client can trigger this issue by crafting an RPC call with an oversized RPC record header, which forces the server to shrink its response buffer allocation. This causes the READDIR response construction to write beyond the available buffer space, resulting in a send buffer overflow that leads to memory corruption, denial of service via crash, or potential data integrity issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NFSD optimizes memory usage by sharing the same page array for both receiving RPC calls and sending replies, since operations typically don\u0027t need large buffers simultaneously. When an RPC call arrives, the response buffer size is calculated based on remaining pages after accounting for the received data. A malicious client can send a correctly-formed but deliberately oversized RPC record containing a small actual RPC call. The NFSD thread processes this normally, but the response buffer (rq_res) is now constrained. When constructing a READDIR reply, which can be quite large, the encoder writes past the truncated buffer boundary into adjacent kernel memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50487"
},
{
"category": "external",
"summary": "RHBZ#2401498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50487"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR"
},
{
"cve": "CVE-2022-50496",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401534"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: Fix UAF in destroy()\n\nDm_cache also has the same UAF problem when dm_resume()\nand dm_destroy() are concurrent.\n\nTherefore, cancelling timer again in destroy().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm cache: Fix UAF in destroy()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50496"
},
{
"category": "external",
"summary": "RHBZ#2401534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50496"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50496",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50496"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50496-6e44@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50496-6e44@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm cache: Fix UAF in destroy()"
},
{
"cve": "CVE-2022-50516",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402307"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: dlm: fix invalid derefence of sb_lvbptr\n\nI experience issues when putting a lkbsb on the stack and have sb_lvbptr\nfield to a dangled pointer while not using DLM_LKF_VALBLK. It will crash\nwith the following kernel message, the dangled pointer is here\n0xdeadbeef as example:\n\n[ 102.749317] BUG: unable to handle page fault for address: 00000000deadbeef\n[ 102.749320] #PF: supervisor read access in kernel mode\n[ 102.749323] #PF: error_code(0x0000) - not-present page\n[ 102.749325] PGD 0 P4D 0\n[ 102.749332] Oops: 0000 [#1] PREEMPT SMP PTI\n[ 102.749336] CPU: 0 PID: 1567 Comm: lock_torture_wr Tainted: G W 5.19.0-rc3+ #1565\n[ 102.749343] Hardware name: Red Hat KVM/RHEL-AV, BIOS 1.16.0-2.module+el8.7.0+15506+033991b0 04/01/2014\n[ 102.749344] RIP: 0010:memcpy_erms+0x6/0x10\n[ 102.749353] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 \u003cf3\u003e a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe\n[ 102.749355] RSP: 0018:ffff97a58145fd08 EFLAGS: 00010202\n[ 102.749358] RAX: ffff901778b77070 RBX: 0000000000000000 RCX: 0000000000000040\n[ 102.749360] RDX: 0000000000000040 RSI: 00000000deadbeef RDI: ffff901778b77070\n[ 102.749362] RBP: ffff97a58145fd10 R08: ffff901760b67a70 R09: 0000000000000001\n[ 102.749364] R10: ffff9017008e2cb8 R11: 0000000000000001 R12: ffff901760b67a70\n[ 102.749366] R13: ffff901760b78f00 R14: 0000000000000003 R15: 0000000000000001\n[ 102.749368] FS: 0000000000000000(0000) GS:ffff901876e00000(0000) knlGS:0000000000000000\n[ 102.749372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 102.749374] CR2: 00000000deadbeef CR3: 000000017c49a004 CR4: 0000000000770ef0\n[ 102.749376] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 102.749378] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 102.749379] PKRU: 55555554\n[ 102.749381] Call Trace:\n[ 102.749382] \u003cTASK\u003e\n[ 102.749383] ? send_args+0xb2/0xd0\n[ 102.749389] send_common+0xb7/0xd0\n[ 102.749395] _unlock_lock+0x2c/0x90\n[ 102.749400] unlock_lock.isra.56+0x62/0xa0\n[ 102.749405] dlm_unlock+0x21e/0x330\n[ 102.749411] ? lock_torture_stats+0x80/0x80 [dlm_locktorture]\n[ 102.749416] torture_unlock+0x5a/0x90 [dlm_locktorture]\n[ 102.749419] ? preempt_count_sub+0xba/0x100\n[ 102.749427] lock_torture_writer+0xbd/0x150 [dlm_locktorture]\n[ 102.786186] kthread+0x10a/0x130\n[ 102.786581] ? kthread_complete_and_exit+0x20/0x20\n[ 102.787156] ret_from_fork+0x22/0x30\n[ 102.787588] \u003c/TASK\u003e\n[ 102.787855] Modules linked in: dlm_locktorture torture rpcsec_gss_krb5 intel_rapl_msr intel_rapl_common kvm_intel iTCO_wdt iTCO_vendor_support kvm vmw_vsock_virtio_transport qxl irqbypass vmw_vsock_virtio_transport_common drm_ttm_helper crc32_pclmul joydev crc32c_intel ttm vsock virtio_scsi virtio_balloon snd_pcm drm_kms_helper virtio_console snd_timer snd drm soundcore syscopyarea i2c_i801 sysfillrect sysimgblt i2c_smbus pcspkr fb_sys_fops lpc_ich serio_raw\n[ 102.792536] CR2: 00000000deadbeef\n[ 102.792930] ---[ end trace 0000000000000000 ]---\n\nThis patch fixes the issue by checking also on DLM_LKF_VALBLK on exflags\nis set when copying the lvbptr array instead of if it\u0027s just null which\nfixes for me the issue.\n\nI think this patch can fix other dlm users as well, depending how they\nhandle the init, freeing memory handling of sb_lvbptr and don\u0027t set\nDLM_LKF_VALBLK for some dlm_lock() calls. It might a there could be a\nhidden issue all the time. However with checking on DLM_LKF_VALBLK the\nuser always need to provide a sb_lvbptr non-null value. There might be\nmore intelligent handling between per ls lvblen, DLM_LKF_VALBLK and\nnon-null to report the user the way how DLM API is used is wrong but can\nbe added for later, this will only fix the current behaviour.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fs: dlm: fix invalid derefence of sb_lvbptr",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50516"
},
{
"category": "external",
"summary": "RHBZ#2402307",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402307"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50516"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100703-CVE-2022-50516-3b07@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100703-CVE-2022-50516-3b07@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fs: dlm: fix invalid derefence of sb_lvbptr"
},
{
"cve": "CVE-2022-50534",
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402282"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: Use last transaction\u0027s pmd-\u003eroot when commit failed\n\nRecently we found a softlock up problem in dm thin pool btree lookup\ncode due to corrupted metadata:\n\n Kernel panic - not syncing: softlockup: hung tasks\n CPU: 7 PID: 2669225 Comm: kworker/u16:3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n Workqueue: dm-thin do_worker [dm_thin_pool]\n Call Trace:\n \u003cIRQ\u003e\n dump_stack+0x9c/0xd3\n panic+0x35d/0x6b9\n watchdog_timer_fn.cold+0x16/0x25\n __run_hrtimer+0xa2/0x2d0\n \u003c/IRQ\u003e\n RIP: 0010:__relink_lru+0x102/0x220 [dm_bufio]\n __bufio_new+0x11f/0x4f0 [dm_bufio]\n new_read+0xa3/0x1e0 [dm_bufio]\n dm_bm_read_lock+0x33/0xd0 [dm_persistent_data]\n ro_step+0x63/0x100 [dm_persistent_data]\n btree_lookup_raw.constprop.0+0x44/0x220 [dm_persistent_data]\n dm_btree_lookup+0x16f/0x210 [dm_persistent_data]\n dm_thin_find_block+0x12c/0x210 [dm_thin_pool]\n __process_bio_read_only+0xc5/0x400 [dm_thin_pool]\n process_thin_deferred_bios+0x1a4/0x4a0 [dm_thin_pool]\n process_one_work+0x3c5/0x730\n\nFollowing process may generate a broken btree mixed with fresh and\nstale btree nodes, which could get dm thin trapped in an infinite loop\nwhile looking up data block:\n Transaction 1: pmd-\u003eroot = A, A-\u003eB-\u003eC // One path in btree\n pmd-\u003eroot = X, X-\u003eY-\u003eZ // Copy-up\n Transaction 2: X,Z is updated on disk, Y write failed.\n // Commit failed, dm thin becomes read-only.\n process_bio_read_only\n\t\t dm_thin_find_block\n\t\t __find_block\n\t\t dm_btree_lookup(pmd-\u003eroot)\nThe pmd-\u003eroot points to a broken btree, Y may contain stale node\npointing to any block, for example X, which gets dm thin trapped into\na dead loop while looking up Z.\n\nFix this by setting pmd-\u003eroot in __open_metadata(), so that dm thin\nwill use the last transaction\u0027s pmd-\u003eroot if commit failed.\n\nFetch a reproducer in [Link].\n\nLinke: https://bugzilla.kernel.org/show_bug.cgi?id=216790",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm thin: Use last transaction\u0027s pmd-\u003eroot when commit failed",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "If a transaction partially writes updated nodes and then fails, the pointer used for lookups may point into a broken tree. The correction reloads the last known good root at open time when a prior commit failed, so later reads do not traverse a corrupted path.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50534"
},
{
"category": "external",
"summary": "RHBZ#2402282",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402282"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50534"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100708-CVE-2022-50534-8900@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100708-CVE-2022-50534-8900@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module dm_thin_pool from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm thin: Use last transaction\u0027s pmd-\u003eroot when commit failed"
},
{
"cve": "CVE-2022-50543",
"cwe": {
"id": "CWE-1341",
"name": "Multiple Releases of Same Resource or Handle"
},
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402222"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix mr-\u003emap double free\n\nrxe_mr_cleanup() which tries to free mr-\u003emap again will be called when\nrxe_mr_init_user() fails:\n\n CPU: 0 PID: 4917 Comm: rdma_flush_serv Kdump: loaded Not tainted 6.1.0-rc1-roce-flush+ #25\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x45/0x5d\n panic+0x19e/0x349\n end_report.part.0+0x54/0x7c\n kasan_report.cold+0xa/0xf\n rxe_mr_cleanup+0x9d/0xf0 [rdma_rxe]\n __rxe_cleanup+0x10a/0x1e0 [rdma_rxe]\n rxe_reg_user_mr+0xb7/0xd0 [rdma_rxe]\n ib_uverbs_reg_mr+0x26a/0x480 [ib_uverbs]\n ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x1a2/0x250 [ib_uverbs]\n ib_uverbs_cmd_verbs+0x1397/0x15a0 [ib_uverbs]\n\nThis issue was firstly exposed since commit b18c7da63fcb (\"RDMA/rxe: Fix\nmemory leak in error path code\") and then we fixed it in commit\n8ff5f5d9d8cf (\"RDMA/rxe: Prevent double freeing rxe_map_set()\") but this\nfix was reverted together at last by commit 1e75550648da (Revert\n\"RDMA/rxe: Create duplicate mapping tables for FMRs\")\n\nSimply let rxe_mr_cleanup() always handle freeing the mr-\u003emap once it is\nsuccessfully allocated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/rxe: Fix mr-\u003emap double free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue arises because of incorrect error handling in the memory region registration path. When rxe_reg_user_mr() calls rxe_mr_init_user() and initialization fails, the error path frees the mr-\u003emap structure. However, the cleanup then calls rxe_mr_cleanup() through __rxe_cleanup(), which attempts to free mr-\u003emap again, resulting in a double-free. This vulnerability was introduced when a previous fix for duplicate mapping tables was reverted, inadvertently reintroducing the double-free condition. Under normal circumstances, a local user with permissions to use RDMA verbs (typically requiring membership in the rdma group or CAP_IPC_LOCK capability) can trigger this by registering user memory regions with specific parameters that cause initialization failure. Double-free vulnerabilities are well-known memory corruption primitives; while direct exploitation for privilege escalation requires understanding kernel heap layout, they provide attackers with a foundation for more sophisticated attacks beyond simple denial of service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50543"
},
{
"category": "external",
"summary": "RHBZ#2402222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50543"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100756-CVE-2022-50543-597d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100756-CVE-2022-50543-597d@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the rdma_rxe module from loading. See https://access.redhat.com/solutions/41278 for instructions on blacklisting kernel modules.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/rxe: Fix mr-\u003emap double free"
},
{
"cve": "CVE-2022-50549",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402251"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata\n\nFollowing concurrent processes:\n\n P1(drop cache) P2(kworker)\ndrop_caches_sysctl_handler\n drop_slab\n shrink_slab\n down_read(\u0026shrinker_rwsem) - LOCK A\n do_shrink_slab\n super_cache_scan\n prune_icache_sb\n dispose_list\n evict\n ext4_evict_inode\n\t ext4_clear_inode\n\t ext4_discard_preallocations\n\t ext4_mb_load_buddy_gfp\n\t ext4_mb_init_cache\n\t ext4_read_block_bitmap_nowait\n\t ext4_read_bh_nowait\n\t submit_bh\n\t dm_submit_bio\n\t\t do_worker\n\t\t\t\t process_deferred_bios\n\t\t\t\t commit\n\t\t\t\t metadata_operation_failed\n\t\t\t\t dm_pool_abort_metadata\n\t\t\t\t down_write(\u0026pmd-\u003eroot_lock) - LOCK B\n\t\t __destroy_persistent_data_objects\n\t\t\t\t dm_block_manager_destroy\n\t\t\t\t dm_bufio_client_destroy\n\t\t\t\t unregister_shrinker\n\t\t\t\t\t down_write(\u0026shrinker_rwsem)\n\t\t thin_map |\n\t\t dm_thin_find_block \u2193\n\t\t down_read(\u0026pmd-\u003eroot_lock) --\u003e ABBA deadlock\n\n, which triggers hung task:\n\n[ 76.974820] INFO: task kworker/u4:3:63 blocked for more than 15 seconds.\n[ 76.976019] Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910\n[ 76.978521] task:kworker/u4:3 state:D stack:0 pid:63 ppid:2\n[ 76.978534] Workqueue: dm-thin do_worker\n[ 76.978552] Call Trace:\n[ 76.978564] __schedule+0x6ba/0x10f0\n[ 76.978582] schedule+0x9d/0x1e0\n[ 76.978588] rwsem_down_write_slowpath+0x587/0xdf0\n[ 76.978600] down_write+0xec/0x110\n[ 76.978607] unregister_shrinker+0x2c/0xf0\n[ 76.978616] dm_bufio_client_destroy+0x116/0x3d0\n[ 76.978625] dm_block_manager_destroy+0x19/0x40\n[ 76.978629] __destroy_persistent_data_objects+0x5e/0x70\n[ 76.978636] dm_pool_abort_metadata+0x8e/0x100\n[ 76.978643] metadata_operation_failed+0x86/0x110\n[ 76.978649] commit+0x6a/0x230\n[ 76.978655] do_worker+0xc6e/0xd90\n[ 76.978702] process_one_work+0x269/0x630\n[ 76.978714] worker_thread+0x266/0x630\n[ 76.978730] kthread+0x151/0x1b0\n[ 76.978772] INFO: task test.sh:2646 blocked for more than 15 seconds.\n[ 76.979756] Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910\n[ 76.982111] task:test.sh state:D stack:0 pid:2646 ppid:2459\n[ 76.982128] Call Trace:\n[ 76.982139] __schedule+0x6ba/0x10f0\n[ 76.982155] schedule+0x9d/0x1e0\n[ 76.982159] rwsem_down_read_slowpath+0x4f4/0x910\n[ 76.982173] down_read+0x84/0x170\n[ 76.982177] dm_thin_find_block+0x4c/0xd0\n[ 76.982183] thin_map+0x201/0x3d0\n[ 76.982188] __map_bio+0x5b/0x350\n[ 76.982195] dm_submit_bio+0x2b6/0x930\n[ 76.982202] __submit_bio+0x123/0x2d0\n[ 76.982209] submit_bio_noacct_nocheck+0x101/0x3e0\n[ 76.982222] submit_bio_noacct+0x389/0x770\n[ 76.982227] submit_bio+0x50/0xc0\n[ 76.982232] submit_bh_wbc+0x15e/0x230\n[ 76.982238] submit_bh+0x14/0x20\n[ 76.982241] ext4_read_bh_nowait+0xc5/0x130\n[ 76.982247] ext4_read_block_bitmap_nowait+0x340/0xc60\n[ 76.982254] ext4_mb_init_cache+0x1ce/0xdc0\n[ 76.982259] ext4_mb_load_buddy_gfp+0x987/0xfa0\n[ 76.982263] ext4_discard_preallocations+0x45d/0x830\n[ 76.982274] ext4_clear_inode+0x48/0xf0\n[ 76.982280] ext4_evict_inode+0xcf/0xc70\n[ 76.982285] evict+0x119/0x2b0\n[ 76.982290] dispose_list+0x43/0xa0\n[ 76.982294] prune_icache_sb+0x64/0x90\n[ 76.982298] super_cache_scan+0x155/0x210\n[ 76.982303] do_shrink_slab+0x19e/0x4e0\n[ 76.982310] shrink_slab+0x2bd/0x450\n[ 76.982317] drop_slab+0xcc/0x1a0\n[ 76.982323] drop_caches_sysctl_handler+0xb7/0xe0\n[ 76.982327] proc_sys_call_handler+0x1bc/0x300\n[ 76.982331] proc_sys_write+0x17/0x20\n[ 76.982334] vfs_write+0x3d3/0x570\n[ 76.982342] ksys_write+0x73/0x160\n[ 76.982347] __x64_sys_write+0x1e/0x30\n[ 76.982352] do_syscall_64+0x35/0x80\n[ 76.982357] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nFunct\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The deadlock occurs through a specific interaction between memory management and device-mapper operations. When cache is dropped (via /proc/sys/vm/drop_caches), the shrink_slab path acquires shrinker_rwsem for reading, then processes filesystem operations that may involve dm-thin devices. Concurrently, when dm-thin metadata operations fail, the dm_pool_abort_metadata function acquires pmd-\u003eroot_lock, destroys the block manager (which unregisters a shrinker), and attempts to acquire shrinker_rwsem for writing. Meanwhile, thin_map operations acquire pmd-\u003eroot_lock for reading. This creates an ABBA deadlock: P1 holds shrinker_rwsem\u2192waits for pmd-\u003eroot_lock, P2 holds pmd-\u003eroot_lock\u2192waits for shrinker_rwsem.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50549"
},
{
"category": "external",
"summary": "RHBZ#2402251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50549"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100758-CVE-2022-50549-cb07@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100758-CVE-2022-50549-cb07@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the dm_thin_pool module from being loaded. See https://access.redhat.com/solutions/41278 for instructions on blacklisting kernel modules.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata"
},
{
"cve": "CVE-2022-50554",
"cwe": {
"id": "CWE-820",
"name": "Missing Synchronization"
},
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402306"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: avoid double -\u003equeue_rq() because of early timeout\n\nDavid Jeffery found one double -\u003equeue_rq() issue, so far it can\nbe triggered in VM use case because of long vmexit latency or preempt\nlatency of vCPU pthread or long page fault in vCPU pthread, then block\nIO req could be timed out before queuing the request to hardware but after\ncalling blk_mq_start_request() during -\u003equeue_rq(), then timeout handler\nmay handle it by requeue, then double -\u003equeue_rq() is caused, and kernel\npanic.\n\nSo far, it is driver\u0027s responsibility to cover the race between timeout\nand completion, so it seems supposed to be solved in driver in theory,\ngiven driver has enough knowledge.\n\nBut it is really one common problem, lots of driver could have similar\nissue, and could be hard to fix all affected drivers, even it isn\u0027t easy\nfor driver to handle the race. So David suggests this patch by draining\nin-progress -\u003equeue_rq() for solving this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: blk-mq: avoid double -\u003equeue_rq() because of early timeout",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50554"
},
{
"category": "external",
"summary": "RHBZ#2402306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50554"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100700-CVE-2022-50554-f4fb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100700-CVE-2022-50554-f4fb@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: blk-mq: avoid double -\u003equeue_rq() because of early timeout"
},
{
"cve": "CVE-2022-50563",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2405757"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: Fix UAF in run_timer_softirq()\n\nWhen dm_resume() and dm_destroy() are concurrent, it will\nlead to UAF, as follows:\n\n BUG: KASAN: use-after-free in __run_timers+0x173/0x710\n Write of size 8 at addr ffff88816d9490f0 by task swapper/0/0\n\u003csnip\u003e\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x73/0x9f\n print_report.cold+0x132/0xaa2\n _raw_spin_lock_irqsave+0xcd/0x160\n __run_timers+0x173/0x710\n kasan_report+0xad/0x110\n __run_timers+0x173/0x710\n __asan_store8+0x9c/0x140\n __run_timers+0x173/0x710\n call_timer_fn+0x310/0x310\n pvclock_clocksource_read+0xfa/0x250\n kvm_clock_read+0x2c/0x70\n kvm_clock_get_cycles+0xd/0x20\n ktime_get+0x5c/0x110\n lapic_next_event+0x38/0x50\n clockevents_program_event+0xf1/0x1e0\n run_timer_softirq+0x49/0x90\n __do_softirq+0x16e/0x62c\n __irq_exit_rcu+0x1fa/0x270\n irq_exit_rcu+0x12/0x20\n sysvec_apic_timer_interrupt+0x8e/0xc0\n\nOne of the concurrency UAF can be shown as below:\n\n use free\ndo_resume |\n __find_device_hash_cell |\n dm_get |\n atomic_inc(\u0026md-\u003eholders) |\n | dm_destroy\n | __dm_destroy\n | if (!dm_suspended_md(md))\n | atomic_read(\u0026md-\u003eholders)\n | msleep(1)\n dm_resume |\n __dm_resume |\n dm_table_resume_targets |\n pool_resume |\n do_waker #add delay work |\n dm_put |\n atomic_dec(\u0026md-\u003eholders) |\n | dm_table_destroy\n | pool_dtr\n | __pool_dec\n | __pool_destroy\n | destroy_workqueue\n | kfree(pool) # free pool\n time out\n__do_softirq\n run_timer_softirq # pool has already been freed\n\nThis can be easily reproduced using:\n 1. create thin-pool\n 2. dmsetup suspend pool\n 3. dmsetup resume pool\n 4. dmsetup remove_all # Concurrent with 3\n\nThe root cause of this UAF bug is that dm_resume() adds timer after\ndm_destroy() skips cancelling the timer because of suspend status.\nAfter timeout, it will call run_timer_softirq(), however pool has\nalready been freed. The concurrency UAF bug will happen.\n\nTherefore, cancelling timer again in __pool_destroy().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm thin: Fix UAF in run_timer_softirq()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Fixes a use-after-free in device-mapper thin-provisioning where delayed works (waker, no_space_timeout) could still fire after a pool is freed during a concurrent dm_resume()/dm_destroy() sequence, leading to UAF in run_timer_softirq() and a kernel crash. Exploitation requires root/DM control (e.g., racing dmsetup resume with dmsetup remove), so the practical risk is local DoS during pool teardown rather than data exfiltration. For the CVSS the PR:H since triggering it needs high-privilege block-stack operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50563"
},
{
"category": "external",
"summary": "RHBZ#2405757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50563"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50563-995f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50563-995f@gregkh/T"
}
],
"release_date": "2025-10-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm thin: Fix UAF in run_timer_softirq()"
},
{
"cve": "CVE-2022-50569",
"discovery_date": "2025-10-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2405765"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: Update ipcomp_scratches with NULL when freed\n\nCurrently if ipcomp_alloc_scratches() fails to allocate memory\nipcomp_scratches holds obsolete address. So when we try to free the\npercpu scratches using ipcomp_free_scratches() it tries to vfree non\nexistent vm area. Described below:\n\nstatic void * __percpu *ipcomp_alloc_scratches(void)\n{\n ...\n scratches = alloc_percpu(void *);\n if (!scratches)\n return NULL;\nipcomp_scratches does not know about this allocation failure.\nTherefore holding the old obsolete address.\n ...\n}\n\nSo when we free,\n\nstatic void ipcomp_free_scratches(void)\n{\n ...\n scratches = ipcomp_scratches;\nAssigning obsolete address from ipcomp_scratches\n\n if (!scratches)\n return;\n\n for_each_possible_cpu(i)\n vfree(*per_cpu_ptr(scratches, i));\nTrying to free non existent page, causing warning: trying to vfree\nexistent vm area.\n ...\n}\n\nFix this breakage by updating ipcomp_scrtches with NULL when scratches\nis freed",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfrm: Update ipcomp_scratches with NULL when freed",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The global ipcomp_scratches could retain a stale pointer when allocation failed or after free, causing ipcomp_free_scratches() to iterate and call vfree() on already-freed/non-existent per-CPU pages\u2014effectively a double free/invalid free leading to warnings or crashes. The fix sets ipcomp_scratches = NULL after free_percpu(scratches), preventing subsequent frees of stale memory. Privileged access to XFRM/IPComp setup is typically required.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50569"
},
{
"category": "external",
"summary": "RHBZ#2405765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405765"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50569"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50569",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50569"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50569-fdd1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50569-fdd1@gregkh/T"
}
],
"release_date": "2025-10-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfrm: Update ipcomp_scratches with NULL when freed"
},
{
"acknowledgments": [
{
"names": [
"Kyle Zeng"
]
}
],
"cve": "CVE-2023-0394",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-01-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2162120"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in rawv6_push_pending_frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0394"
},
{
"category": "external",
"summary": "RHBZ#2162120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2023/01/18/2",
"url": "https://www.openwall.com/lists/oss-security/2023/01/18/2"
}
],
"release_date": "2023-01-17T17:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NULL pointer dereference in rawv6_push_pending_frames"
},
{
"cve": "CVE-2023-0461",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2176192"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/ulp: use-after-free in listening ULP sockets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0461"
},
{
"category": "external",
"summary": "RHBZ#2176192",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c",
"url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"
}
],
"release_date": "2023-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: net/ulp: use-after-free in listening ULP sockets"
},
{
"cve": "CVE-2023-1095",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2173973"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction object not placed on the list head. This flaw allows a local, unprivileged user to crash the system, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1095"
},
{
"category": "external",
"summary": "RHBZ#2173973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095"
}
],
"release_date": "2022-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by preventing the affected netfilter kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head"
},
{
"acknowledgments": [
{
"names": [
"Pumpkin (@u1f383)"
],
"organization": "DEVCORE Internship Program, and NYCU Software Security LAB"
}
],
"cve": "CVE-2023-1195",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154171"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1195"
},
{
"category": "external",
"summary": "RHBZ#2154171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621",
"url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"
}
],
"release_date": "2022-10-02T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c"
},
{
"cve": "CVE-2023-1582",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2023-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180936"
}
],
"notes": [
{
"category": "description",
"text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Soft lockup occurred during __page_mapcount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw applies only to RHEL 8.7 kernel version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1582"
},
{
"category": "external",
"summary": "RHBZ#2180936",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180936"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/",
"url": "https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/"
}
],
"release_date": "2022-02-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling THP on the system.\n~~~\nHow to disable THP ? \nhttps://access.redhat.com/solutions/1320153\n~~~",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Soft lockup occurred during __page_mapcount"
},
{
"acknowledgments": [
{
"names": [
"Wei Chen"
]
}
],
"cve": "CVE-2023-2177",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-04-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187953"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2177"
},
{
"category": "external",
"summary": "RHBZ#2187953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2177"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"
}
],
"release_date": "2022-07-25T12:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common"
},
{
"cve": "CVE-2023-22998",
"cwe": {
"id": "CWE-436",
"name": "Interpretation Conflict"
},
"discovery_date": "2023-03-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2182429"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as they did not include the `virtio_gpu_object_shmem_init` function, introduced upstream in commit 2f2aa13 (\"drm/virtio: move virtio_gpu_mem_entry initialization to new function\").",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-22998"
},
{
"category": "external",
"summary": "RHBZ#2182429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998"
}
],
"release_date": "2023-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()"
},
{
"cve": "CVE-2023-23454",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-01-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2168297"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) read problem was found in cbq_classify in net/sched/sch_cbq.c in the Linux kernel. This issue may allow a local attacker to cause a denial of service due to type confusion. Non-negative numbers could indicate a TC_ACT_SHOT condition rather than valid classification results.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab-out-of-bounds read vulnerabilities in cbq_classify",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23454"
},
{
"category": "external",
"summary": "RHBZ#2168297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12"
}
],
"release_date": "2023-01-01T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "workaround",
"details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nIt is also possible to prevent the affected code from being loaded by blacklisting the `cbq` kernel module. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab-out-of-bounds read vulnerabilities in cbq_classify"
},
{
"cve": "CVE-2023-53064",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2025-05-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2363754"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: fix hang on reboot with ice\n\nWhen a system with E810 with existing VFs gets rebooted the following\nhang may be observed.\n\n Pid 1 is hung in iavf_remove(), part of a network driver:\n PID: 1 TASK: ffff965400e5a340 CPU: 24 COMMAND: \"systemd-shutdow\"\n #0 [ffffaad04005fa50] __schedule at ffffffff8b3239cb\n #1 [ffffaad04005fae8] schedule at ffffffff8b323e2d\n #2 [ffffaad04005fb00] schedule_hrtimeout_range_clock at ffffffff8b32cebc\n #3 [ffffaad04005fb80] usleep_range_state at ffffffff8b32c930\n #4 [ffffaad04005fbb0] iavf_remove at ffffffffc12b9b4c [iavf]\n #5 [ffffaad04005fbf0] pci_device_remove at ffffffff8add7513\n #6 [ffffaad04005fc10] device_release_driver_internal at ffffffff8af08baa\n #7 [ffffaad04005fc40] pci_stop_bus_device at ffffffff8adcc5fc\n #8 [ffffaad04005fc60] pci_stop_and_remove_bus_device at ffffffff8adcc81e\n #9 [ffffaad04005fc70] pci_iov_remove_virtfn at ffffffff8adf9429\n #10 [ffffaad04005fca8] sriov_disable at ffffffff8adf98e4\n #11 [ffffaad04005fcc8] ice_free_vfs at ffffffffc04bb2c8 [ice]\n #12 [ffffaad04005fd10] ice_remove at ffffffffc04778fe [ice]\n #13 [ffffaad04005fd38] ice_shutdown at ffffffffc0477946 [ice]\n #14 [ffffaad04005fd50] pci_device_shutdown at ffffffff8add58f1\n #15 [ffffaad04005fd70] device_shutdown at ffffffff8af05386\n #16 [ffffaad04005fd98] kernel_restart at ffffffff8a92a870\n #17 [ffffaad04005fda8] __do_sys_reboot at ffffffff8a92abd6\n #18 [ffffaad04005fee0] do_syscall_64 at ffffffff8b317159\n #19 [ffffaad04005ff08] __context_tracking_enter at ffffffff8b31b6fc\n #20 [ffffaad04005ff18] syscall_exit_to_user_mode at ffffffff8b31b50d\n #21 [ffffaad04005ff28] do_syscall_64 at ffffffff8b317169\n #22 [ffffaad04005ff50] entry_SYSCALL_64_after_hwframe at ffffffff8b40009b\n RIP: 00007f1baa5c13d7 RSP: 00007fffbcc55a98 RFLAGS: 00000202\n RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1baa5c13d7\n RDX: 0000000001234567 RSI: 0000000028121969 RDI: 00000000fee1dead\n RBP: 00007fffbcc55ca0 R8: 0000000000000000 R9: 00007fffbcc54e90\n R10: 00007fffbcc55050 R11: 0000000000000202 R12: 0000000000000005\n R13: 0000000000000000 R14: 00007fffbcc55af0 R15: 0000000000000000\n ORIG_RAX: 00000000000000a9 CS: 0033 SS: 002b\n\nDuring reboot all drivers PM shutdown callbacks are invoked.\nIn iavf_shutdown() the adapter state is changed to __IAVF_REMOVE.\nIn ice_shutdown() the call chain above is executed, which at some point\ncalls iavf_remove(). However iavf_remove() expects the VF to be in one\nof the states __IAVF_RUNNING, __IAVF_DOWN or __IAVF_INIT_FAILED. If\nthat\u0027s not the case it sleeps forever.\nSo if iavf_shutdown() gets invoked before iavf_remove() the system will\nhang indefinitely because the adapter is already in state __IAVF_REMOVE.\n\nFix this by returning from iavf_remove() if the state is __IAVF_REMOVE,\nas we already went through iavf_shutdown().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iavf: fix hang on reboot with ice",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53064"
},
{
"category": "external",
"summary": "RHBZ#2363754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53064"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025050211-CVE-2023-53064-fe53@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025050211-CVE-2023-53064-fe53@gregkh/T"
}
],
"release_date": "2025-05-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iavf: fix hang on reboot with ice"
},
{
"cve": "CVE-2023-53273",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-09-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-cross-headers-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-headers-0:4.18.0-477.10.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395699"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nDrivers: vmbus: Check for channel allocation before looking up relids\n\nrelid2channel() assumes vmbus channel array to be allocated when called.\nHowever, in cases such as kdump/kexec, not all relids will be reset by the host.\nWhen the second kernel boots and if the guest receives a vmbus interrupt during\nvmbus driver initialization before vmbus_connect() is called, before it finishes,\nor if it fails, the vmbus interrupt service routine is called which in turn calls\nrelid2channel() and can cause a null pointer dereference.\n\nPrint a warning and error out in relid2channel() for a channel id that\u0027s invalid\nin the second kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Drivers: vmbus: Check for channel allocation before looking up relids",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"BaseOS-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debug-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-doc-0:4.18.0-477.10.1.el8_8.noarch",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-modules-extra-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-tools-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:kernel-tools-libs-devel-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:kernel-zfcpdump-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-core-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-devel-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-0:4.18.0-477.10.1.el8_8.x86_64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"BaseOS-8.8.0.GA:python3-perf-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:bpftool-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.src",
"CRB-8.8.0.GA:kernel-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-abi-stablelists-0:4.18.0-477.10.1.el8_8.noarch",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-core-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.ppc64le",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.s390x",
"CRB-8.8.0.GA:kernel-debug-debuginfo-0:4.18.0-477.10.1.el8_8.x86_64",
"CRB-8.8.0.GA:kernel-debug-devel-0:4.18.0-477.10.1.el8_8.aarch64",
"CRB-8.8.0.GA:kernel-debug-devel-0